If you made any changes in Pure these will be visible here soon.

Research Output

2014

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, IACR. 21 p. (Cryptology ePrint Archive; vol. 2014/134)

Research output: Book/ReportReportAcademic

Open Access
File
31 Citations (Scopus)
87 Downloads (Pure)

On the practical exploitability of dual EC in TLS implementations

Checkoway, S., Fredrikson, M., Niederhagen, R. F., Everspaugh, A., Green, M., Lange, T., Ristenpart, T., Bernstein, D. J., Maskiewicz, J. & Shacham, H., 2014, Proceedings of the 23rd USENIX Security Symposium 20-22 August 2014, San Diego CA, USA. Usenix Association, p. 319-335

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

56 Citations (Scopus)

Preface : Selected areas in cryptography - SAC 2013 : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers

Lange, T., Lauter, K. & Lisoněk, P., 1 Jan 2014, In : Lecture Notes in Computer Science. 8282, p. V-VI 2 p.

Research output: Contribution to journalEditorialAcademicpeer-review

Selected Areas in Cryptography - SAC 2013 : 20th International Conference, Burnaby BC, Canada, August 14-16, 2013 : Revised Selected Papers

Lange, T. (ed.), Lauter, K. (ed.) & Lisonek, P. (ed.), 2014, Berlin: Springer. 590 p. (Lecture notes in computer science; vol. 8282)

Research output: Book/ReportBook editingAcademic

SPHINCS: practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 p. (Cryptology ePrint Archive; vol. 2014/795)

Research output: Book/ReportReportAcademic

2013

Addition formulas for elliptic curves

Bernstein, D. J. & Lange, T., 2013, Handbook of Finite Fields. Mullen, G. L. & Panario, D. (eds.). London: Chapman & Hall/CRC Press, p. 440-446 (Discrete Mathematics and Its Applications).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

1 Citation (Scopus)
4 Downloads (Pure)

ECM using Edwards curves

Bernstein, D. J., Birkner, P., Lange, T. & Peters, C. P., 2013, In : Mathematics of Computation. 82, 282, p. 1139-1179

Research output: Contribution to journalArticleAcademicpeer-review

15 Citations (Scopus)

Elligator : elliptic-curve points indistinguishable from uniform random strings

Bernstein, D. J., Hamburg, M., Krasnova, A. & Lange, T., 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013). Sadeghi, A-R., Gligor, V. D. & Yung, M. (eds.). New York: Association for Computing Machinery, Inc, p. 967-979

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

49 Citations (Scopus)

Elligator : elliptic-curve points indistinguishable from uniform random strings

Bernstein, D. J., Hamburg, M., Krasnova, A. & Lange, T., 2013, IACR. 13 p. (Cryptology ePrint Archive; vol. 2013/325)

Research output: Book/ReportReportAcademic

Open Access
File
49 Citations (Scopus)
53 Downloads (Pure)

Factoring RSA keys from certified smart cards : Coppersmith in the wild

Bernstein, D. J., Chang, Y. A., Cheng, C. M., Chou, L. P., Heninger, N., Lange, T. & Someren, van, N., 2013, Advances in Cryptology - ASIACRYPT 2013 (19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013. Proceedings). Sako, K. & Sarkar, P. (eds.). Berlin: Springer, Vol. 3. p. 341-360 (Lecture Notes in Computer Science; vol. 8270).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

47 Citations (Scopus)
2 Downloads (Pure)

Factoring RSA keys from certified smart cards : Coppersmith in the wild

Bernstein, D. J., Chang, Y. A., Cheng, C. M., Chou, L. P., Heninger, N., Lange, T. & Someren, van, N., 2013, IACR. 20 p. (Cryptology ePrint Archive; vol. 2013/599)

Research output: Book/ReportReportAcademic

Open Access
File
102 Downloads (Pure)

MinimaLT : minimal-latency networking through better security

Petullo, W. M., Zhang, X., Solworth, J. A., Bernstein, D. J. & Lange, T., 2013, Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013). New York: Association for Computing Machinery, Inc, p. 425-438

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)
1 Downloads (Pure)

MinimaLT : Minimal-latency networking through better security

Petullo, W. M., Zhang, X., Solworth, J. A., Bernstein, D. J. & Lange, T., 2013, IACR. 13 p. (Cryptology ePrint Archive; vol. 2013/210)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

Never trust a bunny

Bernstein, D. J. & Lange, T., 2013, Radio Frequency Identification. Security and Privacy Issues (8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers). Hoepman, J. H. & Verbauwhede, I. (eds.). Berlin: Springer, p. 137-148 (Lecture Notes in Computer Science; vol. 7739).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

18 Citations (Scopus)

Non-uniform cracks in the concrete : the power of free precomputation

Bernstein, D. J. & Lange, T., 2013, Advances in Cryptology - ASIACRYPT 2013 (19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013. Sako, K. & Sarkar, P. (eds.). Berlin: Springer, Vol. 3. p. 321-340 (Lecture Notes in Computer Science; vol. 8270).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

27 Citations (Scopus)

Pairing-Based Cryptography - Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers

Abdalla, M. (ed.) & Lange, T. (ed.), 2013, Berlin: Springer. 333 p. (Lecture notes in computer science; vol. 7708)

Research output: Book/ReportBook editingAcademic

Quantum algorithms for the subset-sum problem

Bernstein, D. J., Jeffery, S., Lange, T. & Meurer, A., 2013, IACR. 18 p. (Cryptology ePrint Archive; vol. 2013/199)

Research output: Book/ReportReportAcademic

19 Citations (Scopus)
1 Downloads (Pure)

Quantum algorithms for the subset-sum problem

Bernstein, D. J., Jeffery, S., Lange, T. & Meurer, A., 2013, Post-Quantum Cryptography - 5th International Workshop (PQ Crypto 2013, Limoges, France, June 4-7, 2013. Proceedings). Gaborit, P. (ed.). Berlin: Springer, p. 16-33 (Lecture Notes in Computer Science; vol. 7932).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

19 Citations (Scopus)
1 Downloads (Pure)

Two grumpy giants and a baby

Bernstein, D. J. & Lange, T., 2013, ANTS X (Proceedings of the Tenth Algorithmic Number Theory Symposium, San Diego, California, July 9-13, 2012). Howe, E. W. & Kedlaya, K. S. (eds.). Berkeley: Mathematical Sciences Publishers, p. 87-111 (The Open Book Series; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)
2012

Computing small discrete logarithms faster

Bernstein, D. J. & Lange, T., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (eds.). Berlin: Springer, p. 318-338 (Lecture Notes in Computer Science; vol. 7668).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

17 Citations (Scopus)

Computing small discrete logarithms faster

Bernstein, D. J. & Lange, T., 2012, IACR. 26 p. (Cryptology ePrint Archive; vol. 2012/458)

Research output: Book/ReportReportAcademic

Open Access
File
17 Citations (Scopus)
282 Downloads (Pure)

ECC2K-130 on NVIDIA GPUs

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2012, IACR. 19 p. (Cryptology ePrint Archive; vol. 2012/002)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

Faster batch forgery identification

Bernstein, D. J., Doumen, J. M., Lange, T. & Oosterwijk, J., 2012, IACR. 20 p. (Cryptology ePrint Archive; vol. 2012/549)

Research output: Book/ReportReportAcademic

12 Citations (Scopus)
1 Downloads (Pure)

Faster batch forgery identification

Bernstein, D. J., Doumen, J. M., Lange, T. & Oosterwijk, J., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (eds.). Berlin: Springer, p. 454-473 (Lecture Notes in Computer Science; vol. 7668).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

High-speed high-security signatures

Bernstein, D. J., Duif, N., Lange, T., Schwabe, P. & Yang, B. Y., 2012, In : Journal of Cryptographic Engineering. 2, 2, p. 77-89

Research output: Contribution to journalArticleAcademicpeer-review

163 Citations (Scopus)

Never trust a bunny

Bernstein, D. J. & Lange, T., 2012, IACR. 12 p. (Cryptology ePrint Archive; vol. 2012/355)

Research output: Book/ReportReportAcademic

Non-uniform cracks in the concrete: the power of free precomputation

Bernstein, D. J. & Lange, T., 2012, IACR. 21 p. (Cryptology ePrint Archive; vol. 2012/318)

Research output: Book/ReportReportAcademic

The new SHA-3 software shootout

Bernstein, D. J. & Lange, T., 2012, IACR. 13 p. (Cryptology ePrint Archive; vol. 2012/004)

Research output: Book/ReportReportAcademic

10 Downloads (Pure)

The new SHA-3 software shootout

Bernstein, D. J. & Lange, T., 2012, Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012). Gaithersburg MD: National Institute of Standards and Technology (NIST), p. 1-13

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
46 Downloads (Pure)

The security impact of a new cryptographic library

Bernstein, D. J., Lange, T. & Schwabe, P., 2012, Progress in Cryptology - LATINCRYPT 2012 (2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings). Hevia, A. & Neven, G. (eds.). Berlin: Springer, p. 159-176 (Lecture Notes in Computer Science; vol. 7533).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

95 Citations (Scopus)

Two grumpy giants and a baby

Bernstein, D. J. & Lange, T., 2012, IACR. 16 p. (Cryptology ePrint Archive; vol. 2012/294)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

Usable assembly language for GPUs : a success story

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2012, IACR. 10 p. (Cryptology ePrint Archive; vol. 2012/137)

Research output: Book/ReportReportAcademic

2011

A complete set of addition laws for incomplete Edwards curves

Bernstein, D. J. & Lange, T., 2011, In : Journal of Number Theory. 131, 5, p. 858-872

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)
3 Downloads (Pure)

Edwards curves

Lange, T., 2011, Encyclopedia of Cryptography and Security. van Tilborg, H. C. A. & Jajodia, S. (eds.). 2nd ed. New York: Springer, p. 380-382

Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionaryAcademicpeer-review

Elliptic curves for applications (Tutorial)

Lange, T., 2011, Progress in Cryptology - INDOCRYPT 2011 (12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings). Bernstein, D. J. & Chatterjee, S. (eds.). Berlin: Springer, p. 2-2 (Lecture Notes in Computer Science; vol. 7107).

Research output: Chapter in Book/Report/Conference proceedingConference contributionProfessional

2 Downloads (Pure)

Faster 2-regular information-set decoding

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, IACR. (Cryptology ePrint Archive; vol. 2011/120)

Research output: Book/ReportReportAcademic

6 Citations (Scopus)

Faster 2-regular information-set decoding

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, Coding and Cryptology (Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings). Chee, Y. M. (ed.). Berlin: Springer, p. 81-98 (Lecture Notes in Computer Science; vol. 6639).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Faster computation of the Tate pairing

Arène, C., Lange, T., Naehrig, M. & Ritzenthaler, C., 2011, In : Journal of Number Theory. 131, 5, p. 842-857

Research output: Contribution to journalArticleAcademicpeer-review

39 Citations (Scopus)

Hash based signatures

Lange, T., 2011, Encyclopedia of Cryptography and Security. van Tilborg, H. C. A. & Jajodia, S. (eds.). 2 ed. Dordrecht: Springer, p. 540-543

Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionaryAcademicpeer-review

Hash-based signatures

Lange, T., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 540-542

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

High-speed high-security signatures

Bernstein, D. J., Duif, N., Lange, T., Schwabe, P. & Yang, B. Y., 2011, Cryptographic Hardware and Embedded Systems - CHES 2011 (13th International Workshop, Nara, Japan, September 28–October 1, 2011. Proceedings). Preneel, B. & Takagi, T. (eds.). Berlin: Springer, p. 124-142 (Lecture Notes in Computer Science; vol. 6917).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

63 Citations (Scopus)

High-speed high-security signatures

Bernstein, D. J., Duif, N., Lange, T., Schwabe, P. & Yang, B. Y., 2011, IACR. 21 p. (Cryptology ePrint Archive; vol. 2011/368)

Research output: Book/ReportReportAcademic

63 Citations (Scopus)

On the correct use of the negation map in the Pollard rho method

Bernstein, D. J., Lange, T. & Schwabe, P., 2011, IACR. 26 p. (Cryptology ePrint Archive; vol. 2011/003)

Research output: Book/ReportReportAcademic

23 Citations (Scopus)

On the correct use of the negation map in the Pollard rho method

Bernstein, D. J., Lange, T. & Schwabe, P., 2011, Public Key Cryptography - PKC 2011 (14th International Conference on Practice and Theory in Public-Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings). Catalano, D., Fazio, N., Gennaro, R. & Nicolosi, A. (eds.). Berlin: Springer, p. 128-146 (Lecture Notes in Computer Science; vol. 6571).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

23 Citations (Scopus)

Pairing-based key exchange

Lange, T., 2011, Encyclopedia of Cryptography and Security. van Tilborg, H. C. A. & Jajodia, S. (eds.). 2 ed. New York: Springer, p. 903-904

Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionaryProfessional

Really fast syndrome-based hashing

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, Progress in Cryptology - AfricaCrypt 2011 (4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings). Nitaj, A. & Pointcheval, D. (eds.). Berlin: Springer, p. 134-152 (Lecture Notes in Computer Science; vol. 6737).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

Really fast syndrome-based hashing

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, IACR. 19 p. (Cryptology ePrint Archive; vol. 2011/074)

Research output: Book/ReportReportAcademic

10 Citations (Scopus)
2 Downloads (Pure)

Smaller decoding exponents : ball-collision decoding

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Advances in Cryptology - CRYPTO 2011 (31st Annual International Cryptology Conference, Santa Barbara CA, USA, August 14-18, 2011. Proceedings). Rogaway, P. (ed.). Berlin: Springer, p. 743-760 (Lecture Notes in Computer Science; vol. 6841).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

78 Citations (Scopus)

The security impact of a new cryptographic library

Bernstein, D. J., Lange, T. & Schwabe, P., 2011, IACR. (Cryptology ePrint Archive; vol. 2011/646)

Research output: Book/ReportReportAcademic

Vector space

Lange, T., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1356-1356

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional