If you made any changes in Pure these will be visible here soon.

Personal profile

Research profile

I am an associate professor leading the Applied and Provable Security (APS) group at Eindhoven University of Technology (TU/e). My research group and I are currently supported by NWO under the Vidi grant “A solid theory for post-quantum cryptography”. Besides, I am collaborating in the Formosa project to produce machine-checked proofs for high-assurance cryptographic software.  My research focuses on post-quantum cryptography – cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes.  In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography. To learn more about my research, have a look at my personal website.

Previously, I held positions as assistant professor and postdoctoral researcher in the Coding Theory and Cryptology group, working with Tanja Lange in the PQCRYPTO project. Before that I was a postdoctoral researcher in the cryptographic implementations group at TU/e, working with Daniel J. Bernstein. I did my PhD in the cryptography and computer algebra group at TU Darmstadt under the supervision of Johannes Buchmann. Before starting my PhD, I worked as a research fellow at Fraunhofer SIT in Darmstadt. I hold a Diploma in computer science from TU Darmstadt.

Expertise related to UN Sustainable Development Goals

In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):

  • SDG 16 - Peace, Justice and Strong Institutions

Fingerprint

Dive into the research topics where Andreas T. Hülsing is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • The SPHINCS+ signature framework

    Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J. & Schwabe, P., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 2129-2146 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    54 Citations (Scopus)
    321 Downloads (Pure)
  • Quantum Indistinguishability of random sponges

    Czajkowski, J., Hülsing, A. & Schaffner, C., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Cham: Springer, p. 296-325 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    6 Citations (Scopus)
  • Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt.

    Hülsing, A., Meijers, M. & Strub, P-Y., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 622-653 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13507 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Post Quantum Noise.

    Angel, Y., Dowling, B., Hülsing, A., Schwabe, P. & Weber, F., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 97-109 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • Tight Adaptive Reprogramming in the QROM

    Grilo, A. B., Hövelmanns, K., Hülsing, A. & Majenz, C., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 1: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part I. Tibouchi, M. & Wang, H. (eds.). Cham: Springer, p. 637-667 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13090 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)