• 105 Citations
20162019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Leon Groot Bruinderink is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Attacking post-quantum cryptography

Groot Bruinderink, L., 17 Dec 2019, Eindhoven: Technische Universiteit Eindhoven. 185 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)

Open Access
File
165 Downloads (Pure)

Differential fault attacks on deterministic lattice signatures

Bruinderink, L. G. & Pessl, P., 3 Sep 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2018, 3, p. 21-43 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
  • 17 Downloads (Pure)

    HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

    Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • 6 Citations (Scopus)
    2 Downloads (Pure)

    Post-quantum security of the sponge construction

    Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 9 Citations (Scopus)

    “Oops, I did it again” – Security of one-time signatures under two-message attacks

    Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Cham: Springer, p. 299-322 24 p. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 1 Citation (Scopus)

    Courses

    Press / Media

    Weakness in GPG's crypto library

    Tanja Lange, C. van Vredendaal, L. Groot Bruinderink & D.J. Bernstein

    4/07/17

    2 items of Media coverage

    Press/Media: Research

    Student theses

    Frequenties bijhouden met beperkte ruimte

    Author: Groot Bruinderink, L., 2013

    Supervisor: Schoenmakers, L. (Supervisor 1) & de Weger, B. (Supervisor 2)

    Student thesis: Bachelor

    File

    Towards post-quantum bitcoin: side-channel analysis of bimodal lattice signatures

    Author: Groot Bruinderink, L., 29 Feb 2016

    Supervisor: Lange, T. (Supervisor 1), Hülsing, A. (Supervisor 2) & Bonebakker, L. (External person) (External coach)

    Student thesis: Master

    File