If you made any changes in Pure these will be visible here soon.

Research Output 2000 2019

2019
2 Citations (Scopus)
25 Downloads (Pure)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Isogenies
Quantum Circuits
Query
Networks (circuits)
Evaluation
2018
8 Citations (Scopus)

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Public key
Group Action
Elliptic Curves
Cryptography
Key Exchange
32 Downloads (Pure)

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

Research output: Book/ReportReportAcademic

Open Access
File
4 Citations (Scopus)
1 Downloads (Pure)

HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
Error correction
Error Correction
Encapsulation
Encryption
Cryptography

Preface: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings

Lange, T. & Steinwandt, R., 1 Jan 2018, Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Cham: Springer, p. VI (Lecture Notes in Computer Science; vol. 10786).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

44 Downloads (Pure)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 2018, IACR. 56 p. (Cryptology ePrint Archive; vol. 2018/1059)

Research output: Book/ReportReportAcademic

Open Access
File
1 Citation (Scopus)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Signature Scheme
Time Constant
Tables
Rejection Sampling
Sampling
2017

Classic McEliece

Bernstein, D. J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Schwabe, P., Sendrier, N., Szefer, J. & Wang, W., 2017

Research output: Other contributionAcademic

Open Access
Hash functions
ROM
Quantum computers
Binary codes
Random errors
31 Downloads (Pure)

Double-base scalar multiplication revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/037)

Research output: Book/ReportReportAcademic

Open Access
File
99 Downloads (Pure)

"HILA5 pindakaas" : on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L. S., 2017, s.l.: IACR. 14 p. (Cryptology ePrint Archive; vol. 2017/1214)

Research output: Book/ReportReportAcademic

Open Access
File
Error correction
Encapsulation
Cryptography
Recovery

Lattice klepto: Turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Dordrecht: Springer, p. 336-354 19 p. (Lecture Notes in Computer Science; vol. 10179).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Signature Scheme
Encryption

Lattice klepto : turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, s.l.: IACR. 19 p. (Cryptology ePrint Archive ; vol. 2017/1140)

Research output: Book/ReportReportAcademic

Cryptography
124 Downloads (Pure)

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, Topics in Computational Number Theory Inspired by Peter L. Montgomery. Bos, J. W. . & Lenstra, A. K. (eds.). Cambridge: Cambridge University Press, p. 82-115

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
64 Downloads (Pure)

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 43 p. (Cryptology ePrint Archive; vol. 2017/293)

Research output: Book/ReportReportAcademic

Open Access
File
Curve
Time Constant
Elliptic Curves
Scalar
Computing

NTRU Prime

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Vredendaal, C. V., 2017

Research output: Other contributionAcademic

Cryptography
11 Citations (Scopus)

NTRU prime: reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017, Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Berlin: Springer, p. 235-260 26 p. (Lecture Notes in Computer Science; vol. 10719).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Costs
Quantum cryptography
Sorting
72 Downloads (Pure)

NTRU prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017.

Research output: Contribution to conferencePaperAcademic

Open Access
File
23 Citations (Scopus)
62 Downloads (Pure)

Post-quantum cryptography

Bernstein, D. J. & Lange, T., 13 Sep 2017, In : Nature. 549, 7671, p. 188-194 7 p.

Research output: Contribution to journalReview articleAcademicpeer-review

File
223 Downloads (Pure)

Post-quantum cryptography : dealing with the fallout of physics success

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 20 p. (Cryptology ePrint Archive; vol. 2017/314)

Research output: Book/ReportReportAcademic

Open Access
File
cryptography
quantum cryptography
fallout
quantum computers
communication
10 Downloads (Pure)

Preface

Lange, T. & Takagi, T., 2017, Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lange, T. & Takagi, T. (eds.). Dordrecht: Springer, p. VI (LNCS; vol. 10346).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

Open Access
File
65 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/1025)

Research output: Book/ReportReportAcademic

Open Access
File
Sampling
Side channel attack
5 Citations (Scopus)

Short generators without quantum computers: the case of multiquadratics

Bauch, J., Bernstein, D. J., de Valence, H., Lange, T. & van Vredendaal, C., 2017, Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. Coron, J-S. & Nielsen, J. B. (eds.). Dordrecht: Springer, p. 27-59 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10210 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Number theory
Quantum computers
Quantum Computer
Cryptography
Number field
39 Downloads (Pure)

Sliding right into disaster: left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, s.l.: IACR. 21 p. (Cryptology ePrint Archive; vol. 2017/627)

Research output: Book/ReportReportAcademic

Open Access
File
Disasters
Recovery
7 Citations (Scopus)

Sliding right into disaster : left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Fischer, W. & Homma, N. (eds.). Dordrecht: Springer, p. 555-576 22 p. (Lecture Notes in Computer Science; vol. 10529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Disasters
Recovery

SPHINCS+ - Submission to the NIST post-quantum cryptography project

Bernstein, D. J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S-L., Hülsing, A., Kampanakis, P., Kölbl, S., Lange, T., Lauridsen, M. M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J. & Schwabe, P., 2017

Research output: Other contributionAcademic

Open Access
2016
12 Downloads (Pure)

(In-)Secure messaging with the Silent Circle instant messaging protocol

Verschoor, S. R. & Lange, T., 2016, s.l.: IACR. 19 p. (Cryptology ePrint Archive; vol. 2016/703)

Research output: Book/ReportReportAcademic

Open Access
File
Smartphones
Inspection
Communication
Industry
14 Citations (Scopus)

Dual EC: a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R., 2016, The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. Y. A., Naccache, D. & Quisquater, J. J. (eds.). Dordrecht: Springer, p. 256-281 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9100).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Pseudorandom numbers
Patents
Standardization
Ecosystem
Ecosystems
51 Downloads (Pure)

Faster discrete logarithms on FPGAs

Bernstein, D. J., Engels, S., Lange, T., Niederhagen, R., Paar, C., Schwabe, P. & Zimmermann, R., 2016, s.l.: IACR. 16 p. (Cryptology ePrint Archive; vol. 2016/382)

Research output: Book/ReportReportAcademic

Open Access
File
Field programmable gate arrays (FPGA)
Scalability
Costs
118 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 p. (Cryptology ePrint Archive ; vol. 2016/300)

Research output: Book/ReportReportAcademic

Open Access
File
sampler
50 Citations (Scopus)

Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, Vol. 9813. p. 323-345 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Bimodal
Signature Scheme
Cache
Gauss
Attack
42 Downloads (Pure)

NTRU Prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2016, s.l.: IACR. 55 p. (Cryptology ePrint Archive; vol. 2016/461)

Research output: Book/ReportReportAcademic

Open Access
File
Cryptography
Costs
2015
2 Citations (Scopus)
169 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)

Research output: Book/ReportReportAcademic

Open Access
File
Hash functions
Cryptography
2 Citations (Scopus)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Hash functions
Hash Function
Obfuscation
Password
Hashing
279 Downloads (Pure)

Dual EC : a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R. F., 2015, IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/767)

Research output: Book/ReportReportAcademic

Open Access
File
Random number generation
Ecosystems
Standardization
Radar
144 Downloads (Pure)

EdDSA for more curves

Bernstein, D. J., Josefsson, S., Lange, T., Schwabe, P. & Yang, B. Y., 2015, IACR. 5 p. (Cryptology ePrint Archive; vol. 2015/677)

Research output: Book/ReportReportAcademic

Open Access
File
Galois field
Curve
Elliptic Curves
Signature
Odd
6 Citations (Scopus)
3 Downloads (Pure)

How to manipulate curve standards: a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Berlin: Springer, p. 109-139 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Vulnerability
Curve
Costs
Target
Elliptic Curves
6 Citations (Scopus)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2015, Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers. Joye, M. & Moradi, A. (eds.). Berlin: Springer, p. 104-121 (Lecture Notes in Computer Science; vol. 8968).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computer science
Cryptography
Smart cards
Bioinformatics
Artificial intelligence
73 Citations (Scopus)

SPHINCS : practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (eds.). Berlin: Springer, p. 368-397 (Lecture Notes in Computer Science; vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Quantum cryptography
Quantum computers
Program processors
190 Downloads (Pure)

Tighter, faster, simpler side-channel security evaluations beyond computing power

Bernstein, D. J., Lange, T. & Vredendaal, van, C., 2015, IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/221)

Research output: Book/ReportReportAcademic

Open Access
File
Polynomials
Algebra
Cryptography
Sampling
Side channel attack
17 Citations (Scopus)

TweetNaCl : a crypto library in 100 tweets

Bernstein, D. J., van Gastel, B., Janssen, W., Lange, T., Schwabe, P. & Smetsers, S., 2015, Progress in Cryptology - LATINCRYPT 2014 (Third International Conference on Cryptology and Information Security in Latin America, Florianópolis, Brazil, September 17-19, 2014. Revised Selected Papers). Aranha, D. F. & Menezes, A. (eds.). Berlin: Springer, p. 64-83 (Lecture Notes in Computer Science; vol. 8895).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computer systems
Side channel attack
16 Citations (Scopus)

Twisted Hessian curves

Bernstein, D. J., Chuengsatiansup, C., Kohel, D. & Lange, T., 2015, Progress in Cryptology - LATINCRYPT 2015 (4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Cham: Springer, p. 269-294 26 p. (Lecture Notes in Computer Science; vol. 9230).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cofactor
Curve
Scalar multiplication
Elliptic Curves
2014
5 Citations (Scopus)

Batch NFS

Bernstein, D. J. & Lange, T., 2014, Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Joux, A. & Youssef, A. (eds.). Springer, p. 38-58 (Lecture Notes in Computer Science; vol. 8781).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Sieves
Military electronic countermeasures
Networks (circuits)
Factorization

Batch NFS

Bernstein, D. J. & Lange, T., 2014, IACR. 24 p. (Cryptology ePrint Archive; vol. 2014/921)

Research output: Book/ReportReportAcademic

Sieves
Military electronic countermeasures
Networks (circuits)
Factorization
16 Citations (Scopus)
327 Downloads (Pure)

Curve41417: Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, IACR. 19 p. (Cryptology ePrint Archive; vol. 2014/526)

Research output: Book/ReportReportAcademic

Open Access
File
Program processors
16 Citations (Scopus)

Curve41417 : Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings). Batina, L. & Robshaw, M. (eds.). Berlin: Springer, p. 316-334 (Lecture Notes in Computer Science; vol. 8731).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Program processors
3 Downloads (Pure)

How to manipulate curve standards : a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/571)

Research output: Book/ReportReportAcademic

Costs
Vulnerability
Acceptability
Modeling
Key words
6 Citations (Scopus)
14 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, In : LMS Journal of Computation and Mathematics. 17, Spec. Issue A, p. 181-202

Research output: Contribution to journalArticleAcademicpeer-review

Scalar multiplication
Cryptography
Elliptic Curves
Signature Verification
Hyperelliptic Curves
87 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, IACR. 21 p. (Cryptology ePrint Archive; vol. 2014/379)

Research output: Book/ReportReportAcademic

Open Access
File
Cryptography
100 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2014, IACR. 15 p. (Cryptology ePrint Archive; vol. 2014/565)

Research output: Book/ReportReportAcademic

Open Access
File
Cryptography
Side channel attack
Costs
29 Citations (Scopus)
2 Downloads (Pure)

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, Advances in Cryptology - ASIACRYPT 2014 (20th International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2014, Kaohsiung, Taiwan. Proceedings, Part I). Sarkar, P. & Iwata, T. (eds.). Berlin: Springer, p. 317-337 (Lecture Notes in Computer Science; vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Program processors