Research Output per year
Research Output 2007 2019
2019
8
Downloads
(Pure)
Quantum indistinguishability of random sponges
Czajkowski, J., Hülsing, A. & Schaffner, C., 2019, IACR. 36 p. (Cryptology ePrint Archive; no. 2019/069)Research output: Book/Report › Report › Academic
Open Access
File
2017
65
Downloads
(Pure)
Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto
Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/1025)Research output: Book/Report › Report › Academic
Open Access
File
Sampling
Side channel attack
2016
118
Downloads
(Pure)
Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme
Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 p. (Cryptology ePrint Archive ; vol. 2016/300)Research output: Book/Report › Report › Academic
Open Access
File
sampler
2015
ARMed SPHINCS : computing a 41KB signature in 16KB of RAM
Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2015, s.l.: IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/1042)Research output: Book/Report › Report › Academic
Random access storage
Quantum cryptography
Data storage equipment
Microcontrollers
Costs
2
Citations
(Scopus)
169
Downloads
(Pure)
Bad directions in cryptographic hash functions
Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)Research output: Book/Report › Report › Academic
Open Access
File
Hash functions
Cryptography
PALPAS ± PAsswordLess PAssword Synchronization
Horsch, M., Hülsing, A. T. & Buchmann, J., 2015, s.n. 11 p. (arXiv; vol. 1506.04549 [cs.CR])Research output: Book/Report › Report › Academic
Synchronization
Salts
Entropy
Cryptography
Servers
59
Downloads
(Pure)
Semantic security and indistinguishability in the quantum world
Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2015, s.n. 32 p. (arXiv; vol. 1504.05255 [cs.CR])Research output: Book/Report › Report › Academic
Open Access
File
semantics
messages
equivalence
2014
3
Downloads
(Pure)
How to manipulate curve standards : a white paper for the black hat
Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/571)Research output: Book/Report › Report › Academic
Costs
Vulnerability
Acceptability
Modeling
Key words
SPHINCS: practical stateless hash-based signatures
Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 p. (Cryptology ePrint Archive; vol. 2014/795)Research output: Book/Report › Report › Academic
Quantum cryptography
Quantum computers
Program processors