If you made any changes in Pure these will be visible here soon.

Personal profile

Research profile

Please visit my homepage at https://hyperelliptic.org/tanja.

Fingerprint Dive into the research topics where Tanja Lange is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
  • 3 Citations (Scopus)
    45 Downloads (Pure)

    CSIDH: An efficient post-quantum commutative group action

    Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 17 Citations (Scopus)

    CSIDH: an efficient Post-Quantum Commutative Group Action

    Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

    Research output: Book/ReportReportAcademic

    Open Access
    File

    HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

    Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • 5 Citations (Scopus)
    2 Downloads (Pure)

    Preface: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings

    Lange, T. & Steinwandt, R., 1 Jan 2018, Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Cham: Springer, p. VI (Lecture Notes in Computer Science; vol. 10786).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

    Prizes

    Educational Award - Best Master Lecturer 2016

    Tanja Lange (Recipient), 5 Sep 2016

    Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

    Courses

    Cryptology

    1/09/15 → …

    Course

    Introduction to cryptology

    1/09/13 → …

    Course

    Press / Media

    Pitching security vs. privacy is asking the wrong question

    Tanja Lange

    19/03/18

    2 Media contributions

    Press/Media: Public Engagement Activities

    'Nu actie overheid nodig tegen gevaren kwantumcomputers'

    Tanja Lange

    7/02/18

    1 Media contribution

    Press/Media: Public Engagement Activities

    Nieuws en Co

    Tanja Lange

    2/01/18

    1 Media contribution

    Press/Media: Research

    Student theses

    Algebraic differential attacks on symmetric cryptography

    Author: Lukas, K., 19 Dec 2016

    Supervisor: Lange, T. (Supervisor 1), Daemen, J. (External person) (External coach) & Skoric, B. (Supervisor 2)

    Student thesis: Master

    File

    An adaption of the crossbred algorithm for solving multivariate quadratic systems over F2 on GPUs

    Author: Ning, K., 27 Nov 2017

    Supervisor: Lange, T. (Supervisor 1), Bernstein, D. (External coach) & Niederhagen, R. (External coach)

    Student thesis: Master

    File

    Analysis of efficiency of algorithms used in batch factorization

    Author: Hoof, van, I., 2015

    Supervisor: Lange, T. (Supervisor 1) & Bernstein, D. (Supervisor 1)

    Student thesis: Bachelor

    File

    Analysis of the WireGuard protocol

    Author: Wu, S., 24 Jun 2019

    Supervisor: Lange, T. (Supervisor 1), Appelbaum, J. (Supervisor 2) & Donenfeld, J. A. (External person) (External coach)

    Student thesis: Master

    File

    A non-interactive key exchange based on ring-learning with errors

    Author: de Kock, B., 25 Jun 2018

    Supervisor: Lange, T. (Supervisor 1), Skoric, B. (Supervisor 2), Attema, T. (External person) (External coach) & van Heesch, M. (External coach)

    Student thesis: Master

    File