If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

Filter
Report
2019
8 Downloads (Pure)

Quantum indistinguishability of random sponges

Czajkowski, J., Hülsing, A. & Schaffner, C., 2019, IACR. 36 p. (Cryptology ePrint Archive; no. 2019/069)

Research output: Book/ReportReportAcademic

Open Access
File
2017
65 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/1025)

Research output: Book/ReportReportAcademic

Open Access
File
Sampling
Side channel attack
2016
118 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 p. (Cryptology ePrint Archive ; vol. 2016/300)

Research output: Book/ReportReportAcademic

Open Access
File
sampler
2015

ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2015, s.l.: IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/1042)

Research output: Book/ReportReportAcademic

Random access storage
Quantum cryptography
Data storage equipment
Microcontrollers
Costs
2 Citations (Scopus)
169 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)

Research output: Book/ReportReportAcademic

Open Access
File
Hash functions
Cryptography

PALPAS ± PAsswordLess PAssword Synchronization

Horsch, M., Hülsing, A. T. & Buchmann, J., 2015, s.n. 11 p. (arXiv; vol. 1506.04549 [cs.CR])

Research output: Book/ReportReportAcademic

Synchronization
Salts
Entropy
Cryptography
Servers
59 Downloads (Pure)

Semantic security and indistinguishability in the quantum world

Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2015, s.n. 32 p. (arXiv; vol. 1504.05255 [cs.CR])

Research output: Book/ReportReportAcademic

Open Access
File
semantics
messages
equivalence
2014
3 Downloads (Pure)

How to manipulate curve standards : a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/571)

Research output: Book/ReportReportAcademic

Costs
Vulnerability
Acceptability
Modeling
Key words

SPHINCS: practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 p. (Cryptology ePrint Archive; vol. 2014/795)

Research output: Book/ReportReportAcademic

Quantum cryptography
Quantum computers
Program processors