If you made any changes in Pure these will be visible here soon.

Research Output

(In-)Secure messaging with the Silent Circle instant messaging protocol

Verschoor, S. R. & Lange, T., 2016, s.l.: IACR. 19 p. (Cryptology ePrint Archive; vol. 2016/703)

Research output: Book/ReportReportAcademic

Open Access
File
17 Downloads (Pure)

A complete set of addition laws for incomplete Edwards curves

Bernstein, D. J. & Lange, T., 2009, IACR. 13 p. (Cryptology ePrint Archive; vol. 2009/580)

Research output: Book/ReportReportAcademic

A complete set of addition laws for incomplete Edwards curves

Bernstein, D. J. & Lange, T., 2011, In : Journal of Number Theory. 131, 5, p. 858-872

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)
3 Downloads (Pure)

Addition formulas for elliptic curves

Bernstein, D. J. & Lange, T., 2013, Handbook of Finite Fields. Mullen, G. L. & Panario, D. (eds.). London: Chapman & Hall/CRC Press, p. 440-446 (Discrete Mathematics and Its Applications).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

1 Citation (Scopus)
4 Downloads (Pure)

Algebraic realizations of DL systems

Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 547-572 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Algorithms for factoring polynomials over finite fields

Lange, T. & Winterhof, A., 2001, Finite Fields and Applications (Proceedings Fifth International Conference, Fq5, Augsburg, Germany, August 2-9, 1999). Jungnickel, D. & Niederreiter, H. (eds.). Berlin: Springer, p. 319-328

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Analysis and optimization of elliptic-curve single-scalar multiplication

Bernstein, D. J. & Lange, T., 2007, IACR. 19 p. (Cryptology ePrint Archive; vol. 2007/455)

Research output: Book/ReportReportAcademic

Analysis and optimization of elliptic-curve single-scalar multiplication

Bernstein, D. J. & Lange, T., 2008, Finite Fields and Applications (Proceedings 8th International Conference, Fq8, Melbourne, Australia, July 9-13, 2007). Mullen, G. L., Panario, D. & Shparlinski, I. E. (eds.). Providence RI: American Mathematical Society, p. 1-20 (Contemporary Mathematics Series; vol. 461).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A note on López-Dahab coordinates

Lange, T., 2006, Proceedings 4th Central European Conference on Cryptology (Wartacrypt 2004, Bedlewo/Poznan, Poland, July 1-3, 2004). Jaworski, J., Kula, M. & Nemoga, K. (eds.). p. 75-81 (Tatra Mountains Mathematical Publications; vol. 33).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A note on López-Dahab coordinates

Lange, T., 2004, IACR. (Cryptology ePrint Archive; vol. 2004/323)

Research output: Book/ReportReportAcademic

Arithmetic of elliptic curves

Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 267-302 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Arithmetic of hyperelliptic curves

Duquesne, S. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 303-353 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Arithmetic of special curves

Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 355-387 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Arithmetic on binary genus 2 curves suitable for small devices

Lange, T., 2005, Proceedings ECRYPT Workshop on RFID and Lightweight Crypto (Graz, Austria, July 14-15, 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Attacking and defending the McEliece cryptosystem

Bernstein, D. J., Lange, T. & Peters, C. P., 2008, IACR. 16 p. (Cryptology ePrint Archive; vol. 2008/318)

Research output: Book/ReportReportAcademic

133 Citations (Scopus)

Attacking and defending the McEliece cryptosystem

Bernstein, D. J., Lange, T. & Peters, C. P., 2008, Post-Quantum Cryptography (2nd International Workshop, PQCrypto 2008, Cincinnati OH, USA, October 17-19, 2008, Proceedings). Buchmann, J. & Ding, J. (eds.). Berlin: Springer, p. 31-46 (Lecture Notes in Computer Science; vol. 5299).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

133 Citations (Scopus)

Background on curves and Jacobians

Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 45-85 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Background on Weil descent

Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 125-132 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

2 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)

Research output: Book/ReportReportAcademic

Open Access
File
2 Citations (Scopus)
197 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Ball-collision decoding

Bernstein, D. J., Lange, T. & Peters, C. P., 2010, IACR. (Cryptology ePrint Archive; vol. 2010/585)

Research output: Book/ReportReportAcademic

Batch NFS

Bernstein, D. J. & Lange, T., 2014, Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Joux, A. & Youssef, A. (eds.). Springer, p. 38-58 (Lecture Notes in Computer Science; vol. 8781).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Batch NFS

Bernstein, D. J. & Lange, T., 2014, IACR. 24 p. (Cryptology ePrint Archive; vol. 2014/921)

Research output: Book/ReportReportAcademic

Binary Edwards curves

Bernstein, D. J., Lange, T. & Rezaeian Farashahi, R., 2008, Cryptographic Hardware and Embedded Systems - CHES 2008 (10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings). Oswald, E. & Rohatgi, P. (eds.). Berlin: Springer, p. 244-265 (Lecture Notes in Computer Science; vol. 5154).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

76 Citations (Scopus)
2 Downloads (Pure)

Breaking ECC2K-130

Bailey, D. V., Batina, L., Bernstein, D. J., Birkner, P., Bos, J. W., Chen, H-C., Cheng, C. M., Damme, van, G., De Meulenaer, G., Dominguez Perez, L. J., Fan, J., Güneysu, T., Gurkaynak, F., Lange, T., Mentens, N., Niederhagen, R. F., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L. & 2 others, Van Herrewege, A. & Yang, B. Y., 2009, IACR. 19 p. (Cryptology ePrint Archive; vol. 2009/541)

Research output: Book/ReportReportAcademic

Certain exponential sums and random walks on elliptic curves

Lange, T. & Shparlinski, I. E., 2005, In : Canadian Journal of Mathematics / Journal Canadien de Mathématiques. 57, 2, p. 338-350

Research output: Contribution to journalArticleAcademicpeer-review

35 Citations (Scopus)
2 Downloads (Pure)

Classic McEliece

Bernstein, D. J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Schwabe, P., Sendrier, N., Szefer, J. & Wang, W., 2017

Research output: Other contributionAcademic

Open Access

Collisions in fast generation of ideal classes and points on hyperelliptic and elliptic curves

Lange, T. & Shparlinski, I. E., 2005, In : Applicable Algebra in Engineering, Communication and Computing. 15, 5, p. 329-337

Research output: Contribution to journalArticleAcademicpeer-review

10 Citations (Scopus)

Complex multiplication

Frey, G. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 455-473 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

2 Downloads (Pure)

Computing small discrete logarithms faster

Bernstein, D. J. & Lange, T., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (eds.). Berlin: Springer, p. 318-338 (Lecture Notes in Computer Science; vol. 7668).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

17 Citations (Scopus)

Computing small discrete logarithms faster

Bernstein, D. J. & Lange, T., 2012, IACR. 26 p. (Cryptology ePrint Archive; vol. 2012/458)

Research output: Book/ReportReportAcademic

Open Access
File
17 Citations (Scopus)
282 Downloads (Pure)

Cryptanalysis of Skein

Bernstein, D. J. & Lange, T., 2010, IACR. 10 p. (Cryptology ePrint Archive; vol. 2010/623)

Research output: Book/ReportReportAcademic

1 Downloads (Pure)

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

30 Citations (Scopus)

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

Research output: Book/ReportReportAcademic

Open Access
File
49 Downloads (Pure)

Curve41417: Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, IACR. 19 p. (Cryptology ePrint Archive; vol. 2014/526)

Research output: Book/ReportReportAcademic

Open Access
File
16 Citations (Scopus)
347 Downloads (Pure)

Curve41417 : Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings). Batina, L. & Robshaw, M. (eds.). Berlin: Springer, p. 316-334 (Lecture Notes in Computer Science; vol. 8731).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

Distribution of some sequences of points on elliptic curves

Lange, T. & Shparlinski, I. E., 2007, In : Journal of Mathematical Cryptology. 1, 1, p. 1-11

Research output: Contribution to journalArticleAcademicpeer-review

17 Citations (Scopus)
2 Downloads (Pure)

Double-base scalar multiplication revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/037)

Research output: Book/ReportReportAcademic

Open Access
File
38 Downloads (Pure)

Dual EC: a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R., 2016, The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. Y. A., Naccache, D. & Quisquater, J. J. (eds.). Dordrecht: Springer, p. 256-281 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9100).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

17 Citations (Scopus)

Dual EC : a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R. F., 2015, IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/767)

Research output: Book/ReportReportAcademic

Open Access
File
330 Downloads (Pure)

ECC2K-130 on NVIDIA GPUs

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2010, Progress in Cryptology - INDOCRYPT 2010 (11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings). Gong, G. & Gupta, K. C. (eds.). Berlin: Springer, p. 328-346 (Lecture Notes in Computer Science; vol. 6498).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
12 Citations (Scopus)
205 Downloads (Pure)

ECC2K-130 on NVIDIA GPUs

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2012, IACR. 19 p. (Cryptology ePrint Archive; vol. 2012/002)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

ECM on graphics cards

Bernstein, D. J., Chen, T. R., Cheng, C. M., Lange, T. & Yang, B. Y., 2008, IACR. 19 p. (Cryptology ePrint Archive; vol. 2008/480)

Research output: Book/ReportReportAcademic

ECM on graphics cards

Bernstein, D. J., Chen, T. R., Cheng, C. M., Lange, T. & Yang, B. Y., 2009, Advances in Cryptology - Eurocrypt 2009 (28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings). Joux, A. (ed.). Berlin: Springer, p. 483-501 (Lecture Notes in Computer Science; vol. 5479).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

46 Citations (Scopus)

ECM using Edwards curves

Bernstein, D. J., Birkner, P., Lange, T. & Peters, C. P., 2008, IACR. 16 p. (Cryptology ePrint Archive; vol. 2008/016)

Research output: Book/ReportReportAcademic

ECM using Edwards curves

Bernstein, D. J., Birkner, P., Lange, T. & Peters, C. P., 2013, In : Mathematics of Computation. 82, 282, p. 1139-1179

Research output: Contribution to journalArticleAcademicpeer-review

15 Citations (Scopus)

EdDSA for more curves

Bernstein, D. J., Josefsson, S., Lange, T., Schwabe, P. & Yang, B. Y., 2015, IACR. 5 p. (Cryptology ePrint Archive; vol. 2015/677)

Research output: Book/ReportReportAcademic

Open Access
File
161 Downloads (Pure)

Edwards curves

Lange, T., 2011, Encyclopedia of Cryptography and Security. van Tilborg, H. C. A. & Jajodia, S. (eds.). 2nd ed. New York: Springer, p. 380-382

Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionaryAcademicpeer-review

Efficient arithmetic on genus 2 hyperelliptic curves over finite fields via explicit formulae

Lange, T., 2002, IACR. (Cryptology ePrint Archive; vol. 2002/021)

Research output: Book/ReportReportAcademic

Efficient doubling on genus two curves over binary fields

Lange, T. & Stevens, M., 1 Dec 2004, Selected areas in cryptography : 11th Annual Workshop, SAC 2004, Waterloo ON, Canada, August 9-10, 2004 : revised selected papers. Handschuh, H., Hasan, M. A., Wainwright, R. L. & Liebrock, L. M. (eds.). Berlin: Springer, p. 170-181 12 p. (Lecture Notes in Computer Science; vol. 3357).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

21 Citations (Scopus)