• Source: Scopus
20002020

Content available in repository

If you made any changes in Pure these will be visible here soon.

Personal profile

Research profile

I work on cryptography and number theory. I'm chair of the Coding Theory and Cryptology group at the Technische Universiteit Eindhoven in the Department of Mathematics and Computer Science.
Currently I'm also scientific director of the Eindhoven Institute for the Protection of Systems and Information (Ei/Ψ).

Please visit my homepage at https://hyperelliptic.org/tanja for more information.

Fingerprint

Dive into the research topics where Tanja Lange is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 6 Similar Profiles

Network

Recent external collaboration on country level. Dive into details by clicking on the dots or
  • McTiny: Fast high-confidence post-quantum key erasure for tiny network servers

    Bernstein, D. J. & Lange, T., 2020, Proceedings of the 29th USENIX Security Symposium. Usenix Association, p. 1731-1748 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

    Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    15 Citations (Scopus)
    85 Downloads (Pure)
  • CSIDH: An efficient post-quantum commutative group action

    Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    53 Citations (Scopus)
  • CSIDH: an efficient Post-Quantum Commutative Group Action

    Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

    Research output: Book/ReportReportAcademic

    Open Access
    File
    52 Downloads (Pure)
  • HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

    Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    10 Citations (Scopus)
    2 Downloads (Pure)
If you made any changes in Pure these will be visible here soon.