If you made any changes in Pure these will be visible here soon.

Research Output

2019

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Citations (Scopus)
57 Downloads (Pure)
2018

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

25 Citations (Scopus)

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

Research output: Book/ReportReportAcademic

Open Access
File
46 Downloads (Pure)

HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
6 Citations (Scopus)
2 Downloads (Pure)

Preface: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings

Lange, T. & Steinwandt, R., 1 Jan 2018, Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Cham: Springer, p. VI (Lecture Notes in Computer Science; vol. 10786).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 2018, IACR. 56 p. (Cryptology ePrint Archive; vol. 2018/1059)

Research output: Book/ReportReportAcademic

Open Access
File
55 Downloads (Pure)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2017

Classic McEliece

Bernstein, D. J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Schwabe, P., Sendrier, N., Szefer, J. & Wang, W., 2017

Research output: Other contributionAcademic

Open Access

Double-base scalar multiplication revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/037)

Research output: Book/ReportReportAcademic

Open Access
File
38 Downloads (Pure)

"HILA5 pindakaas" : on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L. S., 2017, s.l.: IACR. 14 p. (Cryptology ePrint Archive; vol. 2017/1214)

Research output: Book/ReportReportAcademic

Open Access
File
116 Downloads (Pure)

Lattice klepto: Turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Dordrecht: Springer, p. 336-354 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Lattice klepto : turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, s.l.: IACR. 19 p. (Cryptology ePrint Archive ; vol. 2017/1140)

Research output: Book/ReportReportAcademic

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, Topics in Computational Number Theory Inspired by Peter L. Montgomery. Bos, J. W. . & Lenstra, A. K. (eds.). Cambridge: Cambridge University Press, p. 82-115

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
151 Downloads (Pure)

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 43 p. (Cryptology ePrint Archive; vol. 2017/293)

Research output: Book/ReportReportAcademic

Open Access
File
78 Downloads (Pure)

NTRU Prime

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Vredendaal, C. V., 2017

Research output: Other contributionAcademic

NTRU prime: reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Berlin: Springer, p. 235-260 26 p. (Lecture Notes in Computer Science; vol. 10719).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

NTRU prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017.

Research output: Contribution to conferencePaperAcademic

Open Access
File
117 Downloads (Pure)

Post-quantum cryptography

Bernstein, D. J. & Lange, T., 14 Sep 2017, In : Nature. 549, 7671, p. 188-194 7 p.

Research output: Contribution to journalReview articleAcademicpeer-review

File
34 Citations (Scopus)
145 Downloads (Pure)

Post-quantum cryptography : dealing with the fallout of physics success

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 20 p. (Cryptology ePrint Archive; vol. 2017/314)

Research output: Book/ReportReportAcademic

Open Access
File
233 Downloads (Pure)

Preface

Lange, T. & Takagi, T., 2017, Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lange, T. & Takagi, T. (eds.). Dordrecht: Springer, p. VI (LNCS; vol. 10346).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

Open Access
File
13 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/1025)

Research output: Book/ReportReportAcademic

Open Access
File
70 Downloads (Pure)

Short generators without quantum computers: the case of multiquadratics

Bauch, J., Bernstein, D. J., de Valence, H., Lange, T. & van Vredendaal, C., 2017, Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. Coron, J-S. & Nielsen, J. B. (eds.). Dordrecht: Springer, p. 27-59 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10210 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Sliding right into disaster: left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, s.l.: IACR. 21 p. (Cryptology ePrint Archive; vol. 2017/627)

Research output: Book/ReportReportAcademic

Open Access
File
71 Downloads (Pure)

Sliding right into disaster : left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Homma, N. & Fischer, W. (eds.). Dordrecht: Springer, p. 555-576 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10529 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

SPHINCS+ - Submission to the NIST post-quantum cryptography project

Bernstein, D. J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S-L., Hülsing, A., Kampanakis, P., Kölbl, S., Lange, T., Lauridsen, M. M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access
2016

(In-)Secure messaging with the Silent Circle instant messaging protocol

Verschoor, S. R. & Lange, T., 2016, s.l.: IACR. 19 p. (Cryptology ePrint Archive; vol. 2016/703)

Research output: Book/ReportReportAcademic

Open Access
File
17 Downloads (Pure)

Dual EC: a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R., 2016, The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. Y. A., Naccache, D. & Quisquater, J. J. (eds.). Dordrecht: Springer, p. 256-281 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9100).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

15 Citations (Scopus)

Faster discrete logarithms on FPGAs

Bernstein, D. J., Engels, S., Lange, T., Niederhagen, R., Paar, C., Schwabe, P. & Zimmermann, R., 2016, s.l.: IACR. 16 p. (Cryptology ePrint Archive; vol. 2016/382)

Research output: Book/ReportReportAcademic

Open Access
File
70 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 p. (Cryptology ePrint Archive ; vol. 2016/300)

Research output: Book/ReportReportAcademic

Open Access
File
167 Downloads (Pure)

Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, Vol. 9813. p. 323-345 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

58 Citations (Scopus)

NTRU Prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2016, s.l.: IACR. 55 p. (Cryptology ePrint Archive; vol. 2016/461)

Research output: Book/ReportReportAcademic

Open Access
File
63 Downloads (Pure)
2015

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)

Research output: Book/ReportReportAcademic

Open Access
File
2 Citations (Scopus)
194 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Dual EC : a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R. F., 2015, IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/767)

Research output: Book/ReportReportAcademic

Open Access
File
320 Downloads (Pure)

EdDSA for more curves

Bernstein, D. J., Josefsson, S., Lange, T., Schwabe, P. & Yang, B. Y., 2015, IACR. 5 p. (Cryptology ePrint Archive; vol. 2015/677)

Research output: Book/ReportReportAcademic

Open Access
File
156 Downloads (Pure)

How to manipulate curve standards: a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Berlin: Springer, p. 109-139 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
3 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2015, Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers. Joye, M. & Moradi, A. (eds.). Berlin: Springer, p. 104-121 (Lecture Notes in Computer Science; vol. 8968).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

SPHINCS : practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (eds.). Berlin: Springer, p. 368-397 (Lecture Notes in Computer Science; vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

91 Citations (Scopus)

Tighter, faster, simpler side-channel security evaluations beyond computing power

Bernstein, D. J., Lange, T. & Vredendaal, van, C., 2015, IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/221)

Research output: Book/ReportReportAcademic

Open Access
File
206 Downloads (Pure)

TweetNaCl : a crypto library in 100 tweets

Bernstein, D. J., van Gastel, B., Janssen, W., Lange, T., Schwabe, P. & Smetsers, S., 2015, Progress in Cryptology - LATINCRYPT 2014 (Third International Conference on Cryptology and Information Security in Latin America, Florianópolis, Brazil, September 17-19, 2014. Revised Selected Papers). Aranha, D. F. & Menezes, A. (eds.). Berlin: Springer, p. 64-83 (Lecture Notes in Computer Science; vol. 8895).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)

Twisted Hessian curves

Bernstein, D. J., Chuengsatiansup, C., Kohel, D. & Lange, T., 2015, Progress in Cryptology - LATINCRYPT 2015 (4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Cham: Springer, p. 269-294 26 p. (Lecture Notes in Computer Science; vol. 9230).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

18 Citations (Scopus)
2014

Batch NFS

Bernstein, D. J. & Lange, T., 2014, Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Joux, A. & Youssef, A. (eds.). Springer, p. 38-58 (Lecture Notes in Computer Science; vol. 8781).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Batch NFS

Bernstein, D. J. & Lange, T., 2014, IACR. 24 p. (Cryptology ePrint Archive; vol. 2014/921)

Research output: Book/ReportReportAcademic

Curve41417: Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, IACR. 19 p. (Cryptology ePrint Archive; vol. 2014/526)

Research output: Book/ReportReportAcademic

Open Access
File
16 Citations (Scopus)
343 Downloads (Pure)

Curve41417 : Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings). Batina, L. & Robshaw, M. (eds.). Berlin: Springer, p. 316-334 (Lecture Notes in Computer Science; vol. 8731).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

How to manipulate curve standards : a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/571)

Research output: Book/ReportReportAcademic

3 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, In : LMS Journal of Computation and Mathematics. 17, Spec. Issue A, p. 181-202

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)
14 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, IACR. 21 p. (Cryptology ePrint Archive; vol. 2014/379)

Research output: Book/ReportReportAcademic

Open Access
File
103 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2014, IACR. 15 p. (Cryptology ePrint Archive; vol. 2014/565)

Research output: Book/ReportReportAcademic

Open Access
File
112 Downloads (Pure)

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, Advances in Cryptology - ASIACRYPT 2014 (20th International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2014, Kaohsiung, Taiwan. Proceedings, Part I). Sarkar, P. & Iwata, T. (eds.). Berlin: Springer, p. 317-337 (Lecture Notes in Computer Science; vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)
2 Downloads (Pure)