If you made any changes in Pure these will be visible here soon.

Personal profile

Research profile

Please visit my homepage at https://hyperelliptic.org/tanja.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2000 2019

1 Citation (Scopus)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Isogenies
Quantum Circuits
Query
Networks (circuits)
Evaluation

Constrained arrays and erasure decoding

Utomo, P. H., 6 Nov 2018, Eindhoven: Technische Universiteit Eindhoven. 114 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
5 Citations (Scopus)

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Public key
Group Action
Elliptic Curves
Cryptography
Key Exchange

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

Research output: Book/ReportReportAcademic

Open Access
File

Exploiting mathematical structures in cryptography

van Vredendaal, C., 5 Jun 2018, Eindhoven: Technische Universiteit Eindhoven. 233 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File

Prizes

Educational Award - Best Master Lecturer 2016

Tanja Lange (Recipient), 5 Sep 2016

Recognition: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

Press / Media

Pitching security vs. privacy is asking the wrong question

Tanja Lange

19/03/18

2 media contributions

Press/Media: Public Engagement Activities

'Nu actie overheid nodig tegen gevaren kwantumcomputers'

Tanja Lange

7/02/18

1 media contribution

Press/Media: Public Engagement Activities

Student theses

Algebraic differential attacks on symmetric cryptography

Author: Lukas, K., 19 Dec 2016

Supervisor: Lange, T. (Supervisor 1), Daemen, J. (External person) (External coach) & Skoric, B. (Supervisor 2)

Student thesis: Master

File

An adaption of the crossbred algorithm for solving multivariate quadratic systems over F2 on GPUs

Author: Ning, K., 27 Nov 2017

Supervisor: Lange, T. (Supervisor 1), Bernstein, D. (External coach) & Niederhagen, R. (External coach)

Student thesis: Master

File

Analysis of efficiency of algorithms used in batch factorization

Author: Hoof, van, I., 2015

Supervisor: Lange, T. (Supervisor 1) & Bernstein, D. (Supervisor 1)

Student thesis: Bachelor

File

Analysis of the WireGuard protocol

Author: Wu, S., 24 Jun 2019

Supervisor: Lange, T. (Supervisor 1), Appelbaum, J. (Supervisor 2) & Donenfeld, J. A. (External person) (External coach)

Student thesis: Master

File

A non-interactive key exchange based on ring-learning with errors

Author: de Kock, B., 25 Jun 2018

Supervisor: Lange, T. (Supervisor 1), Skoric, B. (Supervisor 2), Attema, T. (External person) (External coach) & van Heesch, M. (External coach)

Student thesis: Master

File