If you made any changes in Pure these will be visible here soon.

Research Output

2011

Wild McEliece

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers). Biryukov, A., Gong, G. & Stinson, D. R. (eds.). Berlin: Springer, p. 143-158 (Lecture Notes in Computer Science; vol. 6544).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

32 Citations (Scopus)
1 Downloads (Pure)

Wild McEliece Incognito

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings). Yang, B. Y. (ed.). Berlin: Springer, p. 244-254 (Lecture Notes in Computer Science; vol. 7071).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

Wild McEliece Incognito

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, IACR. 13 p. (Cryptology ePrint Archive; vol. 2011/502)

Research output: Book/ReportReportAcademic

16 Citations (Scopus)
1 Downloads (Pure)
2010

Ball-collision decoding

Bernstein, D. J., Lange, T. & Peters, C. P., 2010, IACR. (Cryptology ePrint Archive; vol. 2010/585)

Research output: Book/ReportReportAcademic

Cryptanalysis of Skein

Bernstein, D. J. & Lange, T., 2010, IACR. 10 p. (Cryptology ePrint Archive; vol. 2010/623)

Research output: Book/ReportReportAcademic

1 Downloads (Pure)

ECC2K-130 on NVIDIA GPUs

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2010, Progress in Cryptology - INDOCRYPT 2010 (11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings). Gong, G. & Gupta, K. C. (eds.). Berlin: Springer, p. 328-346 (Lecture Notes in Computer Science; vol. 6498).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
12 Citations (Scopus)
205 Downloads (Pure)

Faster pairing computations on curves with high-degree twists

Costello, C., Lange, T. & Naehrig, M., 2010, Public Key Cryptography - PKC 2010 (13th International Conference on Practice and Theory in Public-Key Cryptography, Paris, France, May 26-28, 2010. Proceedings). Nguyen, P. Q. & Pointcheval, D. (eds.). Berlin: Springer, p. 224-242 (Lecture Notes in Computer Science; vol. 6056).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

57 Citations (Scopus)

Progress in cryptology - AFRICACRYPT 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010 : proceedings

Bernstein, D. J. (ed.) & Lange, T. (ed.), 2010, Berlin: Springer. (Lecture notes in computer science; vol. 6055)(Progess in cryptology - AFRICACRYPT; vol. 3)

Research output: Book/ReportBook editingAcademic

Starfish on strike

Bernstein, D. J., Birkner, P. & Lange, T., 2010, Progress in Cryptology - LATINCRYPT 2010 (First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010. Proceedings). Abdalla, M. & Barretto, P. S. L. M. (eds.). Berlin: Springer, p. 61-80 (Lecture Notes in Computer Science; vol. 6212).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
1 Downloads (Pure)

Starfish on strike

Bernstein, D. J., Birkner, P. & Lange, T., 2010, IACR. 17 p. (Cryptology ePrint Archive; vol. 2010/367)

Research output: Book/ReportReportAcademic

7 Citations (Scopus)

Type-II optimal polynomial bases

Bernstein, D. J. & Lange, T., 2010, IACR. 17 p. (Cryptology ePrint Archive; vol. 2010/069)

Research output: Book/ReportReportAcademic

13 Citations (Scopus)
1 Downloads (Pure)

Type-II optimal polynomial bases

Bernstein, D. J. & Lange, T., 2010, Arithmetic of Finite Fields (Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings). Hasan, M. A. & Helleseth, T. (eds.). Berlin: Springer, p. 41-61 (Lecture Notes in Computer Science; vol. 6087).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)
1 Downloads (Pure)

Wild McEliece

Bernstein, D. J., Lange, T. & Peters, C. P., 2010, IACR. 17 p. (Cryptology ePrint Archive; vol. 2010/410)

Research output: Book/ReportReportAcademic

2009

A complete set of addition laws for incomplete Edwards curves

Bernstein, D. J. & Lange, T., 2009, IACR. 13 p. (Cryptology ePrint Archive; vol. 2009/580)

Research output: Book/ReportReportAcademic

Breaking ECC2K-130

Bailey, D. V., Batina, L., Bernstein, D. J., Birkner, P., Bos, J. W., Chen, H-C., Cheng, C. M., Damme, van, G., De Meulenaer, G., Dominguez Perez, L. J., Fan, J., Güneysu, T., Gurkaynak, F., Lange, T., Mentens, N., Niederhagen, R. F., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L. & 2 others, Van Herrewege, A. & Yang, B. Y., 2009, IACR. 19 p. (Cryptology ePrint Archive; vol. 2009/541)

Research output: Book/ReportReportAcademic

ECM on graphics cards

Bernstein, D. J., Chen, T. R., Cheng, C. M., Lange, T. & Yang, B. Y., 2009, Advances in Cryptology - Eurocrypt 2009 (28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings). Joux, A. (ed.). Berlin: Springer, p. 483-501 (Lecture Notes in Computer Science; vol. 5479).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

46 Citations (Scopus)

Explicit bounds for generic decoding algorithms for code-based cryptography

Bernstein, D. J., Lange, T., Peters, C. P. & Tilborg, van, H. C. A., 2009, International Workshop on Coding and Cryptography (WCC 2009, Ullensvang, Norway, May 10-15, 2009. Pre-proceedings). Bergen: Selmer Center, University of Bergen, p. 168-180

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Downloads (Pure)

Faster computation of Tate pairings

Arène, C., Lange, T., Naehrig, M. & Ritzenthaler, C., 2009, IACR. 21 p. (Cryptology ePrint Archive; vol. 2009/155)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

Faster pairing computations on curves with high-degree twists

Costello, C., Lange, T. & Naehrig, M., 2009, IACR. 16 p. (Cryptology ePrint Archive; vol. 2009/615)

Research output: Book/ReportReportAcademic

FSBday : Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

Bernstein, D. J., Lange, T., Niederhagen, R. F., Peters, C. P. & Schwabe, P., 2009, IACR. 19 p. (Cryptology ePrint Archive; vol. 2009/292)

Research output: Book/ReportReportAcademic

1 Downloads (Pure)

FSBday : Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

Bernstein, D. J., Lange, T., Niederhagen, R. F., Peters, C. P. & Schwabe, P., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptographic Systems, Lausanne, Switzerland, September 9-10, 2009). p. 85-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

FSBday : Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

Bernstein, D. J., Lange, T., Niederhagen, R. F., Peters, C. P. & Schwabe, P., 2009, Progress in Cryptology - INDOCRYPT 2009 (Proceedings 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009). Roy, B. & Sendrier, N. (eds.). Berlin: Springer, p. 18-38 (Lecture Notes in Computer Science; vol. 5922).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
15 Downloads (Pure)

The billion-mulmod-per-second PC

Bernstein, D. J., Chen, H-C., Chen, M. S., Cheng, C. M., Hsiao, C. H., Lange, T., Lin, Z. C. & Yang, B. Y., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptograhic Systems, Lausanne, Switserland, September 9-10, 2009). p. 131-144

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

The Certicom challenges ECC2-X

Bailey, D. V., Baldwin, B., Batina, L., Bernstein, D. J., Birkner, P., Bos, J. W., Damme, van, G., De Meulenaer, G., Fan, J., Güneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Paar, C., Regazzoni, F., Schwabe, P. & Uhsadel, L., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptographic Systems, Lausanne, Switzerland, September 9-10, 2009). p. 51-82

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)
2008

Analysis and optimization of elliptic-curve single-scalar multiplication

Bernstein, D. J. & Lange, T., 2008, Finite Fields and Applications (Proceedings 8th International Conference, Fq8, Melbourne, Australia, July 9-13, 2007). Mullen, G. L., Panario, D. & Shparlinski, I. E. (eds.). Providence RI: American Mathematical Society, p. 1-20 (Contemporary Mathematics Series; vol. 461).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Attacking and defending the McEliece cryptosystem

Bernstein, D. J., Lange, T. & Peters, C. P., 2008, IACR. 16 p. (Cryptology ePrint Archive; vol. 2008/318)

Research output: Book/ReportReportAcademic

133 Citations (Scopus)

Attacking and defending the McEliece cryptosystem

Bernstein, D. J., Lange, T. & Peters, C. P., 2008, Post-Quantum Cryptography (2nd International Workshop, PQCrypto 2008, Cincinnati OH, USA, October 17-19, 2008, Proceedings). Buchmann, J. & Ding, J. (eds.). Berlin: Springer, p. 31-46 (Lecture Notes in Computer Science; vol. 5299).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

133 Citations (Scopus)

Binary Edwards curves

Bernstein, D. J., Lange, T. & Rezaeian Farashahi, R., 2008, Cryptographic Hardware and Embedded Systems - CHES 2008 (10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings). Oswald, E. & Rohatgi, P. (eds.). Berlin: Springer, p. 244-265 (Lecture Notes in Computer Science; vol. 5154).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

76 Citations (Scopus)
2 Downloads (Pure)

ECM on graphics cards

Bernstein, D. J., Chen, T. R., Cheng, C. M., Lange, T. & Yang, B. Y., 2008, IACR. 19 p. (Cryptology ePrint Archive; vol. 2008/480)

Research output: Book/ReportReportAcademic

ECM using Edwards curves

Bernstein, D. J., Birkner, P., Lange, T. & Peters, C. P., 2008, IACR. 16 p. (Cryptology ePrint Archive; vol. 2008/016)

Research output: Book/ReportReportAcademic

Revisiting pairing based group key exchange

Desmedt, Y. & Lange, T., 2008, Financial Cryptography and Data Security (12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers). Tsudik, G. (ed.). Berlin: Springer, p. 53-68 (Lecture Notes in Computer Science; vol. 5143).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)
4 Downloads (Pure)

Searchable encryption revisited : Consistency properties, relation to anonymous IBE, and extensions

Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P. & Shi, H., 2008, In : Journal of Cryptology. 21, 3, p. 350-391

Research output: Contribution to journalArticleAcademicpeer-review

208 Citations (Scopus)
4 Downloads (Pure)

Twisted Edwards curves

Bernstein, D. J., Birkner, P., Joye, M., Lange, T. & Peters, C. P., 2008, Progress in Cryptology - Africacrypt 2008 (First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings). Vaudenay, S. (ed.). Berlin: Springer, p. 389-405 (Lecture Notes in Computer Science; vol. 5023).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

209 Citations (Scopus)
1 Downloads (Pure)

Twisted Edwards curves

Bernstein, D. J., Birkner, P., Joye, M., Lange, T. & Peters, C. P., 2008, IACR. 13 p. (Cryptology ePrint Archive; vol. 2008/013)

Research output: Book/ReportReportAcademic

2007

Analysis and optimization of elliptic-curve single-scalar multiplication

Bernstein, D. J. & Lange, T., 2007, IACR. 19 p. (Cryptology ePrint Archive; vol. 2007/455)

Research output: Book/ReportReportAcademic

Distribution of some sequences of points on elliptic curves

Lange, T. & Shparlinski, I. E., 2007, In : Journal of Mathematical Cryptology. 1, 1, p. 1-11

Research output: Contribution to journalArticleAcademicpeer-review

17 Citations (Scopus)
2 Downloads (Pure)

Faster addition and doubling on elliptic curves

Bernstein, D. J. & Lange, T., 2007, IACR. 22 p. (Cryptology ePrint Archive; vol. 2007/286)

Research output: Book/ReportReportAcademic

224 Citations (Scopus)

Faster addition and doubling on elliptic curves

Bernstein, D. J. & Lange, T., 2007, Advances in Cryptology - Asiacrypt 2007 (13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-7, 2007. Proceedings). Kurosawa, K. (ed.). Berlin: Springer, p. 29-50 (Lecture Notes in Computer Science; vol. 4833).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
224 Citations (Scopus)
245 Downloads (Pure)

Fast scalar multiplication on elliptic curves

Lange, T., 2007, Proceedings Conference on Algorithmic Number Theory 2007, 8-11 May 2007, Turku, Finland. Ernvall-Hytönen, A. M., Jutila, M., Karhumäki, J. & Lepistö, A. (eds.). Turku Center for Computer Science, p. 82-82 (TUCS General Publications; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Inverted Edwards coordinates

Bernstein, D. J. & Lange, T., 2007, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (17th International Conference, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings). Boztas, S. & Lu, H. (eds.). Berlin: Springer, p. 20-27 (Lecture Notes in Computer Science; vol. 4851).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
35 Citations (Scopus)
97 Downloads (Pure)

Inverted Edwards coordinates

Bernstein, D. J. & Lange, T., 2007, IACR. 8 p. (Cryptology ePrint Archive; vol. 2007/410)

Research output: Book/ReportReportAcademic

35 Citations (Scopus)

Optimizing double-base elliptic-curve single-scalar multiplication

Bernstein, D. J., Birkner, P., Lange, T. & Peters, C. P., 2007, IACR. 16 p. (Cryptology ePrint Archive; vol. 2007/414)

Research output: Book/ReportReportAcademic

24 Citations (Scopus)

Optimizing double-base elliptic-curve single-scalar multiplication

Bernstein, D. J., Birkner, P., Lange, T. & Peters, C. P., 2007, Proceedings of the 8th International Conference on Cryptology in India: Progress in Cryptology (INDOCRYPT 2007) 9-13 December 2007, Chennai, India. Srinathan, K., Pandu Rangan, C. & Yung, M. (eds.). Berlin, Germany: Springer, p. 167-182 (Lecture Notes in Computer Science; vol. 4859).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
24 Citations (Scopus)
254 Downloads (Pure)

Scalable authenticated tree based group key exchange for ad-hoc groups

Desmedt, Y., Lange, T. & Burmester, M., 2007, Revised selected papers of the 11th International Conference on Financial Cryptography and Data Security & First International Workshop on Usable Security (FC 2007 & USEC 2007) 12-16 February 2007, Scarborough, Trinidad and Tobago. Dietrich, S. & Dhamija, R. (eds.). Berlin, Germany: Springer, p. 104-118 (Lecture Notes in Computer Science; vol. 4886).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
18 Citations (Scopus)
108 Downloads (Pure)
2006

Algebraic realizations of DL systems

Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 547-572 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

A note on López-Dahab coordinates

Lange, T., 2006, Proceedings 4th Central European Conference on Cryptology (Wartacrypt 2004, Bedlewo/Poznan, Poland, July 1-3, 2004). Jaworski, J., Kula, M. & Nemoga, K. (eds.). p. 75-81 (Tatra Mountains Mathematical Publications; vol. 33).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Arithmetic of elliptic curves

Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 267-302 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Arithmetic of hyperelliptic curves

Duquesne, S. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 303-353 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Arithmetic of special curves

Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 355-387 (Discrete Mathematics and Its Applications; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic