If you made any changes in Pure these will be visible here soon.

Personal profile

Research profile

I am an assistant professor in the Coding Theory and Cryptology group at TU Eindhoven. My research focuses on post-quantum cryptography – cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes.  In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography. To learn more about my research, have a look at my personal homepage.

Before my current position, I was a postdoctoral researcher in the Coding Theory and Cryptology group, working with Tanja Lange in the PQCRYPTO project. Before I was a postdoctoral researcher in the cryptographic implementations group at TU Eindhoven, working with Daniel J. Bernstein. I did my PhD in the cryptography and computer algebra group at TU Darmstadt under the supervision of Johannes Buchmann. Before starting my PhD, I worked as a research fellow at Fraunhofer SIT in Darmstadt. I hold a Diploma in computer science from TU Darmstadt.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Signature Scheme Mathematics
Signature Mathematics
Hash functions Engineering & Materials Science
Cryptography Engineering & Materials Science
Hash Function Mathematics
Quantum cryptography Engineering & Materials Science
Attack Mathematics
Sampling Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2007 2018

2 Citations (Scopus)

Post-quantum security of the sponge construction

Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Collapsing
Collision
Hash functions
Hash Function
Random Permutation
1 Citation (Scopus)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Signature Scheme
Time Constant
Tables
Rejection Sampling
Sampling
1 Citation (Scopus)

SOFIA: MQ-based signatures in the QROM

Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Random Oracle Model
Signature
ROM
Timing Attack
Identification Scheme

XMSS: extended hash-based signatures. RFC 8391

Hülsing, A. T., Butin, D., Gazdag, S-L., Rijneveld, J. & Mohaisen, A., 2018

Research output: Other contributionProfessional

Open Access

“Oops, i did it again” – Security of one-time signatures under two-message attacks

Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Cham: Springer, p. 299-322 24 p. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Standardization
Signature
Attack
Degradation
Imply

Courses

Applied cryptography

1/09/15 → …

Course

Cryptology

1/09/15 → …

Course

Press / Media

Proposals of post-quantum cryptography

Andreas Hülsing & Tanja Lange

23/12/1727/12/17

2 items of media coverage

Press/Media: Research

Student theses

Securing BLISS-b against side-channel attacks: lattice-based cryptography in a post-quantum setting

Author: Smeets, C., 27 Mar 2017

Supervisor: Hülsing, A. (Supervisor 1) & Lange, T. (Supervisor 2)

Student thesis: Master

File

Towards post-quantum bitcoin: side-channel analysis of bimodal lattice signatures

Author: Groot Bruinderink, L., 29 Feb 2016

Supervisor: Lange, T. (Supervisor 1), Hülsing, A. (Supervisor 2) & Bonebakker, L. (External person) (External coach)

Student thesis: Master

File