If you made any changes in Pure these will be visible here soon.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2016 2019

Attacking post-quantum cryptography

Groot Bruinderink, L., 17 Dec 2019, (Accepted/In press) Eindhoven: Technische Universiteit Eindhoven. 185 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File

Differential fault attacks on deterministic lattice signatures

Bruinderink, L. G. & Pessl, P., 3 Sep 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2018, 3, p. 21-43 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Recovery
Linear algebra
Microcontrollers
Cryptography
Clocks
4 Citations (Scopus)

HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
Error correction
Error Correction
Encapsulation
Encryption
Cryptography
5 Citations (Scopus)

Post-quantum security of the sponge construction

Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Collapsing
Collision
Hash functions
Hash Function
Random Permutation

“Oops, i did it again” – Security of one-time signatures under two-message attacks

Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Cham: Springer, p. 299-322 24 p. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Standardization
Signature
Attack
Degradation
Imply

Courses

Press / Media

Weakness in GPG's crypto library

Tanja Lange, C. van Vredendaal, Leon Groot Bruinderink & D.J. Bernstein

4/07/17

2 items of media coverage

Press/Media: Research

Student theses

Frequenties bijhouden met beperkte ruimte

Author: Groot Bruinderink, L., 2013

Supervisor: Schoenmakers, L. (Supervisor 1) & de Weger, B. (Supervisor 2)

Student thesis: Bachelor

File

Timing attacks and the NTRU public-key cryptosystem

Author: Gunter, S., 1 Aug 2019

Supervisor: Lange, T. (Supervisor 1) & Groot Bruinderink, L. (Supervisor 2)

Student thesis: Bachelor

File

Towards post-quantum bitcoin: side-channel analysis of bimodal lattice signatures

Author: Groot Bruinderink, L., 29 Feb 2016

Supervisor: Lange, T. (Supervisor 1), Hülsing, A. (Supervisor 2) & Bonebakker, L. (External person) (External coach)

Student thesis: Master

File