Research Output per year
Research Output 2007 2019
Quantum Indistinguishability of random sponges
Czajkowski, J., Hülsing, A. & Schaffner, C., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Cham: Springer, p. 296-325 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Post-quantum security of the sponge construction
Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto
Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
SOFIA: MQ-based signatures in the QROM
Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
“Oops, i did it again” – Security of one-time signatures under two-message attacks
Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Cham: Springer, p. 299-322 24 p. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
High-speed key encapsulation from NTRU
Hülsing, A., Rijneveld, J., Schanck, J. & Schwabe, P., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings. Springer, p. 232-252 21 p. (Lecture Notes in Computer Science; vol. 10529).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
ARMed SPHINCS computing a 41KB signature in 16KB of RAM
Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Berlin: Springer, p. 446-470 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme
Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, Vol. 9813. p. 323-345 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
From 5-pass MQ-based identification to MQ-based signatures
Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 135-165 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 ).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Mitigating multi-target attacks in hash-based signatures
Hülsing, A. T., Rijneveld, J. & Song, F., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, Vol. 9614. p. 387-416 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Semantic security and indistinguishability in the quantum world
Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Robshaw, M. & Katz, J. (eds.). Dordrecht: Springer, p. 60-89 30 p. (Lecture Notes in Computer Science; vol. 9816).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Bad directions in cryptographic hash functions
Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
How to manipulate curve standards: a white paper for the black hat
Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Berlin: Springer, p. 109-139 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
PALPAS - PAssword Less PAssword synchronization
Horsch, M., Hülsing, A. T. & Buchmann, J., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway: Institute of Electrical and Electronics Engineers, p. 30-39 10 p. 7299896Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
SPHINCS : practical stateless hash-based signatures
Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (eds.). Berlin: Springer, p. 368-397 (Lecture Notes in Computer Science; vol. 9056).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers
Buchmann, J., Cabarcas, D., Göpfert, F., Hülsing, A. T. & Weiden, P., 2014, Selected Areas in Cryptography - SAC 2013 (20th International Conference, Burnaby BC, Canada, August 14-16, 2013. Revised Selected Papers). Lange, T., Lauter, K. & Lisonek, P. (eds.). Berlin: Springer, p. 402-417 (Lecture Notes in Computer Science; vol. 8282).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Revocation and non-repudiation : when the first destroys the latter
Braun, J., Kiefer, F. & Hülsing, A. T., 2014, Public Key Infrastructures, Services and Applications (10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers). Katsikas, S. & Agudo, I. (eds.). Berlin: Springer, p. 31-46 (Lecture Notes in Computer Science; vol. 8341).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Developing and testing a visual hash scheme
Olembo, M. M., Kilian, T., Stockhardt, S., Hülsing, A. & Volkamer, M., 2013, Proceedings of the European Information Security Multi-Conference, EISMC 2013, 8-10 may 2013, Portugal, Lisbon. Plymouth University, Centre for Security, Communications & Network Research, p. 91-100 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Forward secure signatures on smart cards preliminary version
Hülsing, A., Busold, C. & Buchmann, J., 2013, Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Knudsen, L. R. & Wu, H. (eds.). Berlin: Springer, p. 66-80 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7707 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
How to avoid the breakdown of public key infrastructures: forward secure signatures for certificate authorities
Braun, J., Hülsing, A., Wiesmaier, A., Vigil, M. A. G. & Buchmann, J., 2013, Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. De Capitani di Vimercati, S. & Mitchell, C. (eds.). Berlin: Springer, p. 53-68 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7868 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Optimal parameters for XMSSMT
Hülsing, A. T., Rausch, L. & Buchmann, J., 2013, Security engineering and intelligence informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Berlin: Springer, p. 194-208 15 p. (Lecture Notes in Computer Science; vol. 8128).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
W-OTS+ - shorter signatures for hash-based signature schemes
Hülsing, A. T., 2013, Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Youssef, A., Nitaj, A. & Hassanien, A. E. (eds.). Berlin: Springer, p. 173-188 16 p. (Lecture Notes in Computer Science (LNSC); vol. 7918).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
On the security of the Winternitz one-time signature scheme
Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2011, Progress in Cryptology – AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 Proceedings. Nitaj, A. & Pointcheval, D. (eds.). Berlin: Springer, p. 363-378 16 p. (Lecture Notes in Computer Science; vol. 6737).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
XMSS : a practical forward secure signature scheme based on minimal security assumptions
Buchmann, J., Dahmen, E. & Hülsing, A., 2011, Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings. Yang, B-Y. (ed.). Berlin: Springer, p. 117-129 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Security of invertible media authentication schemes revisited
Dönigus, D., Endler, S., Fischlin, M., Hülsing, A. T., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding : 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. & Bas, P. (eds.). Berlin: Springer, p. 189-203 15 p. (Lecture Notes in Computer Science (LNCS); vol. 4567).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review