If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

2019

Decisional second-preimage resistance: when does SPR imply PRE?

Bernstein, D. J. & Hülsing, A. T., 2019, 36 p.

Research output: Other contributionAcademic

Hash functions
8 Downloads (Pure)

Quantum indistinguishability of random sponges

Czajkowski, J., Hülsing, A. & Schaffner, C., 2019, IACR. 36 p. (Cryptology ePrint Archive; no. 2019/069)

Research output: Book/ReportReportAcademic

Open Access
File

Quantum Indistinguishability of random sponges

Czajkowski, J., Hülsing, A. & Schaffner, C., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Cham: Springer, p. 296-325 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Internal
Random Permutation
Random Function
Pseudorandom Function
Output

Tighter proofs of CCA security in the quantum random oracle model

Bindel, N., Hamburg, M., Hülsing, A. & Persichetti, E., 2019, 29 p.

Research output: Other contributionAcademic

Random Oracle Model
Rejection
Lemma
Transform
Public Key Encryption
2018
5 Citations (Scopus)

Post-quantum security of the sponge construction

Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Collapsing
Collision
Hash functions
Hash Function
Random Permutation
1 Citation (Scopus)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Signature Scheme
Time Constant
Tables
Rejection Sampling
Sampling
2 Citations (Scopus)

SOFIA: MQ-based signatures in the QROM

Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Random Oracle Model
Signature
ROM
Timing Attack
Identification Scheme

XMSS: extended hash-based signatures. RFC 8391

Hülsing, A. T., Butin, D., Gazdag, S-L., Rijneveld, J. & Mohaisen, A., 2018

Research output: Other contributionProfessional

Open Access

“Oops, i did it again” – Security of one-time signatures under two-message attacks

Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Cham: Springer, p. 299-322 24 p. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Standardization
Signature
Attack
Degradation
Imply
2017
8 Citations (Scopus)

High-speed key encapsulation from NTRU

Hülsing, A., Rijneveld, J., Schanck, J. & Schwabe, P., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings. Springer, p. 232-252 21 p. (Lecture Notes in Computer Science; vol. 10529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Encapsulation
Cryptography
High Speed
Software
Cryptosystem

MQDSS - Submission to the NIST post-quantum cryptography project

Chen, M-S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access

NTRU-HRSS-KEM - Submission to the NIST post-quantum cryptography project

Hülsing, A., Rijneveld, J., Schanck, J. M. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access

Post-quantum security of the sponge construction

Czajkowski, J., Groot Bruinderink, L., Hülsing, A. T., Schaffner, C. & Unruh, D., 2017, p. 1-32.

Research output: Contribution to conferencePaperAcademic

Collapsing
Hash Function
Collision
Random Permutation
Random Function
65 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/1025)

Research output: Book/ReportReportAcademic

Open Access
File
Sampling
Side channel attack

SPHINCS+ - Submission to the NIST post-quantum cryptography project

Bernstein, D. J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S-L., Hülsing, A., Kampanakis, P., Kölbl, S., Lange, T., Lauridsen, M. M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access
2016
9 Citations (Scopus)

ARMed SPHINCS computing a 41KB signature in 16KB of RAM

Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Berlin: Springer, p. 446-470 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Random access storage
Signature
Data storage equipment
Computing
Microprocessor
117 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 p. (Cryptology ePrint Archive ; vol. 2016/300)

Research output: Book/ReportReportAcademic

Open Access
File
sampler
50 Citations (Scopus)

Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, Vol. 9813. p. 323-345 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Bimodal
Signature Scheme
Cache
Gauss
Attack
12 Citations (Scopus)

From 5-pass MQ-based identification to MQ-based signatures

Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 135-165 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 ).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Signature
Timing Attack
Identification Scheme
Quadratic equation
Security Analysis
31 Citations (Scopus)

Mitigating multi-target attacks in hash-based signatures

Hülsing, A. T., Rijneveld, J. & Song, F., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, Vol. 9614. p. 387-416 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Hash functions
Signature
Attack
Target
Signature Scheme
12 Citations (Scopus)

Semantic security and indistinguishability in the quantum world

Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Robshaw, M. & Katz, J. (eds.). Dordrecht: Springer, p. 60-89 30 p. (Lecture Notes in Computer Science; vol. 9816).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Semantic Security
Cryptography
Semantics
Encryption
Networks (circuits)
2015

ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2015, s.l.: IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/1042)

Research output: Book/ReportReportAcademic

Random access storage
Quantum cryptography
Data storage equipment
Microcontrollers
Costs
2 Citations (Scopus)
169 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)

Research output: Book/ReportReportAcademic

Open Access
File
Hash functions
Cryptography
2 Citations (Scopus)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Hash functions
Hash Function
Obfuscation
Password
Hashing
6 Citations (Scopus)
3 Downloads (Pure)

How to manipulate curve standards: a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Berlin: Springer, p. 109-139 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Vulnerability
Curve
Costs
Target
Elliptic Curves

PALPAS ± PAsswordLess PAssword Synchronization

Horsch, M., Hülsing, A. T. & Buchmann, J., 2015, s.n. 11 p. (arXiv; vol. 1506.04549 [cs.CR])

Research output: Book/ReportReportAcademic

Synchronization
Salts
Entropy
Cryptography
Servers
1 Citation (Scopus)

PALPAS - PAssword Less PAssword synchronization

Horsch, M., Hülsing, A. T. & Buchmann, J., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway: Institute of Electrical and Electronics Engineers, p. 30-39 10 p. 7299896

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Synchronization
Salts
Entropy
Cryptography
Servers
59 Downloads (Pure)

Semantic security and indistinguishability in the quantum world

Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2015, s.n. 32 p. (arXiv; vol. 1504.05255 [cs.CR])

Research output: Book/ReportReportAcademic

Open Access
File
semantics
messages
equivalence
73 Citations (Scopus)

SPHINCS : practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (eds.). Berlin: Springer, p. 368-397 (Lecture Notes in Computer Science; vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Quantum cryptography
Quantum computers
Program processors
2014

Developing and testing SCoP : a visual hash scheme

Maina Olembo, M., Kilian, T., Stockhardt, S., Hülsing, A. & Volkamer, M., 7 Oct 2014, In : Information Management and Computer Security. 22, 4, p. 382-392 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

Testing
certification
voting
electronics
Color
29 Citations (Scopus)
1 Downloads (Pure)

Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers

Buchmann, J., Cabarcas, D., Göpfert, F., Hülsing, A. T. & Weiden, P., 2014, Selected Areas in Cryptography - SAC 2013 (20th International Conference, Burnaby BC, Canada, August 14-16, 2013. Revised Selected Papers). Lange, T., Lauter, K. & Lisonek, P. (eds.). Berlin: Springer, p. 402-417 (Lecture Notes in Computer Science; vol. 8282).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Gaussian distribution
Cryptography
Sampling
Data storage equipment
3 Downloads (Pure)

How to manipulate curve standards : a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/571)

Research output: Book/ReportReportAcademic

Costs
Vulnerability
Acceptability
Modeling
Key words
1 Citation (Scopus)
1 Downloads (Pure)

Revocation and non-repudiation : when the first destroys the latter

Braun, J., Kiefer, F. & Hülsing, A. T., 2014, Public Key Infrastructures, Services and Applications (10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers). Katsikas, S. & Agudo, I. (eds.). Berlin: Springer, p. 31-46 (Lecture Notes in Computer Science; vol. 8341).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Stamping
Costs

SPHINCS: practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 p. (Cryptology ePrint Archive; vol. 2014/795)

Research output: Book/ReportReportAcademic

Quantum cryptography
Quantum computers
Program processors
2013

Developing and testing a visual hash scheme

Olembo, M. M., Kilian, T., Stockhardt, S., Hülsing, A. & Volkamer, M., 2013, Proceedings of the European Information Security Multi-Conference, EISMC 2013, 8-10 may 2013, Portugal, Lisbon. Plymouth University, Centre for Security, Communications & Network Research, p. 91-100 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Testing
Color
14 Citations (Scopus)

Forward secure signatures on smart cards preliminary version

Hülsing, A., Busold, C. & Buchmann, J., 2013, Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Knudsen, L. R. & Wu, H. (eds.). Berlin: Springer, p. 66-80 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7707 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Smart cards
Smart Card
Signature Scheme
Signature
2 Citations (Scopus)

How to avoid the breakdown of public key infrastructures: forward secure signatures for certificate authorities

Braun, J., Hülsing, A., Wiesmaier, A., Vigil, M. A. G. & Buchmann, J., 2013, Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. De Capitani di Vimercati, S. & Mitchell, C. (eds.). Berlin: Springer, p. 53-68 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7868 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Public Key Infrastructure
Certificate
Breakdown
Timestamp
Signature
6 Citations (Scopus)

On the security of the Winternitz one-time signature scheme

Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2013, In : International Journal of Applied Cryptography. 3, 1, p. 84-96 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

Signature Scheme
Hash functions
Pseudorandom Function
Hash Function
Pseudorandomness
24 Citations (Scopus)

Optimal parameters for XMSSMT

Hülsing, A. T., Rausch, L. & Buchmann, J., 2013, Security engineering and intelligence informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Berlin: Springer, p. 194-208 15 p. (Lecture Notes in Computer Science; vol. 8128).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Optimal Parameter
Signature Scheme
Linear Optimization
Use Case
Control Parameter
35 Citations (Scopus)

W-OTS+ - shorter signatures for hash-based signature schemes

Hülsing, A. T., 2013, Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Youssef, A., Nitaj, A. & Hassanien, A. E. (eds.). Berlin: Springer, p. 173-188 16 p. (Lecture Notes in Computer Science (LNSC); vol. 7918).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Short Signature
Signature Scheme
Signature
Standard Model
Attack
2011
30 Citations (Scopus)

On the security of the Winternitz one-time signature scheme

Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2011, Progress in Cryptology – AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 Proceedings. Nitaj, A. & Pointcheval, D. (eds.). Berlin: Springer, p. 363-378 16 p. (Lecture Notes in Computer Science; vol. 6737).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Signature Scheme
Hash functions
Pseudorandom Function
Hash Function
Pseudorandomness
81 Citations (Scopus)
1 Downloads (Pure)

XMSS : a practical forward secure signature scheme based on minimal security assumptions

Buchmann, J., Dahmen, E. & Hülsing, A., 2011, Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings. Yang, B-Y. (ed.). Berlin: Springer, p. 117-129 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Hash functions
Signature Scheme
Hash Function
Signature
Requirements
2007

Security of invertible media authentication schemes revisited

Dönigus, D., Endler, S., Fischlin, M., Hülsing, A. T., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding : 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. & Bas, P. (eds.). Berlin: Springer, p. 189-203 15 p. (Lecture Notes in Computer Science (LNCS); vol. 4567).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Confidentiality
Invertible
Authentication
Cryptography
Watermark