If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Report
2018

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

Research output: Book/ReportReportAcademic

Open Access
File
46 Downloads (Pure)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 2018, IACR. 56 p. (Cryptology ePrint Archive; vol. 2018/1059)

Research output: Book/ReportReportAcademic

Open Access
File
55 Downloads (Pure)
2017

Double-base scalar multiplication revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/037)

Research output: Book/ReportReportAcademic

Open Access
File
38 Downloads (Pure)

"HILA5 pindakaas" : on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L. S., 2017, s.l.: IACR. 14 p. (Cryptology ePrint Archive; vol. 2017/1214)

Research output: Book/ReportReportAcademic

Open Access
File
116 Downloads (Pure)

Lattice klepto : turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, s.l.: IACR. 19 p. (Cryptology ePrint Archive ; vol. 2017/1140)

Research output: Book/ReportReportAcademic

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 43 p. (Cryptology ePrint Archive; vol. 2017/293)

Research output: Book/ReportReportAcademic

Open Access
File
78 Downloads (Pure)

Post-quantum cryptography : dealing with the fallout of physics success

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 20 p. (Cryptology ePrint Archive; vol. 2017/314)

Research output: Book/ReportReportAcademic

Open Access
File
233 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 p. (Cryptology ePrint Archive; vol. 2017/1025)

Research output: Book/ReportReportAcademic

Open Access
File
70 Downloads (Pure)

Sliding right into disaster: left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, s.l.: IACR. 21 p. (Cryptology ePrint Archive; vol. 2017/627)

Research output: Book/ReportReportAcademic

Open Access
File
71 Downloads (Pure)
2016

(In-)Secure messaging with the Silent Circle instant messaging protocol

Verschoor, S. R. & Lange, T., 2016, s.l.: IACR. 19 p. (Cryptology ePrint Archive; vol. 2016/703)

Research output: Book/ReportReportAcademic

Open Access
File
17 Downloads (Pure)

Faster discrete logarithms on FPGAs

Bernstein, D. J., Engels, S., Lange, T., Niederhagen, R., Paar, C., Schwabe, P. & Zimmermann, R., 2016, s.l.: IACR. 16 p. (Cryptology ePrint Archive; vol. 2016/382)

Research output: Book/ReportReportAcademic

Open Access
File
70 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 p. (Cryptology ePrint Archive ; vol. 2016/300)

Research output: Book/ReportReportAcademic

Open Access
File
167 Downloads (Pure)

NTRU Prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2016, s.l.: IACR. 55 p. (Cryptology ePrint Archive; vol. 2016/461)

Research output: Book/ReportReportAcademic

Open Access
File
63 Downloads (Pure)
2015

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)

Research output: Book/ReportReportAcademic

Open Access
File
2 Citations (Scopus)
194 Downloads (Pure)

Dual EC : a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R. F., 2015, IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/767)

Research output: Book/ReportReportAcademic

Open Access
File
320 Downloads (Pure)

EdDSA for more curves

Bernstein, D. J., Josefsson, S., Lange, T., Schwabe, P. & Yang, B. Y., 2015, IACR. 5 p. (Cryptology ePrint Archive; vol. 2015/677)

Research output: Book/ReportReportAcademic

Open Access
File
156 Downloads (Pure)

Tighter, faster, simpler side-channel security evaluations beyond computing power

Bernstein, D. J., Lange, T. & Vredendaal, van, C., 2015, IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/221)

Research output: Book/ReportReportAcademic

Open Access
File
206 Downloads (Pure)
2014

Batch NFS

Bernstein, D. J. & Lange, T., 2014, IACR. 24 p. (Cryptology ePrint Archive; vol. 2014/921)

Research output: Book/ReportReportAcademic

Curve41417: Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, IACR. 19 p. (Cryptology ePrint Archive; vol. 2014/526)

Research output: Book/ReportReportAcademic

Open Access
File
16 Citations (Scopus)
343 Downloads (Pure)

How to manipulate curve standards : a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/571)

Research output: Book/ReportReportAcademic

3 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, IACR. 21 p. (Cryptology ePrint Archive; vol. 2014/379)

Research output: Book/ReportReportAcademic

Open Access
File
103 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2014, IACR. 15 p. (Cryptology ePrint Archive; vol. 2014/565)

Research output: Book/ReportReportAcademic

Open Access
File
112 Downloads (Pure)

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, IACR. 21 p. (Cryptology ePrint Archive; vol. 2014/134)

Research output: Book/ReportReportAcademic

Open Access
File
31 Citations (Scopus)
84 Downloads (Pure)

SPHINCS: practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 p. (Cryptology ePrint Archive; vol. 2014/795)

Research output: Book/ReportReportAcademic

2013

Elligator : elliptic-curve points indistinguishable from uniform random strings

Bernstein, D. J., Hamburg, M., Krasnova, A. & Lange, T., 2013, IACR. 13 p. (Cryptology ePrint Archive; vol. 2013/325)

Research output: Book/ReportReportAcademic

Open Access
File
48 Citations (Scopus)
47 Downloads (Pure)

Factoring RSA keys from certified smart cards : Coppersmith in the wild

Bernstein, D. J., Chang, Y. A., Cheng, C. M., Chou, L. P., Heninger, N., Lange, T. & Someren, van, N., 2013, IACR. 20 p. (Cryptology ePrint Archive; vol. 2013/599)

Research output: Book/ReportReportAcademic

Open Access
File
100 Downloads (Pure)

MinimaLT : Minimal-latency networking through better security

Petullo, W. M., Zhang, X., Solworth, J. A., Bernstein, D. J. & Lange, T., 2013, IACR. 13 p. (Cryptology ePrint Archive; vol. 2013/210)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

Quantum algorithms for the subset-sum problem

Bernstein, D. J., Jeffery, S., Lange, T. & Meurer, A., 2013, IACR. 18 p. (Cryptology ePrint Archive; vol. 2013/199)

Research output: Book/ReportReportAcademic

17 Citations (Scopus)
1 Downloads (Pure)
2012

Computing small discrete logarithms faster

Bernstein, D. J. & Lange, T., 2012, IACR. 26 p. (Cryptology ePrint Archive; vol. 2012/458)

Research output: Book/ReportReportAcademic

Open Access
File
17 Citations (Scopus)
278 Downloads (Pure)

ECC2K-130 on NVIDIA GPUs

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2012, IACR. 19 p. (Cryptology ePrint Archive; vol. 2012/002)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

Faster batch forgery identification

Bernstein, D. J., Doumen, J. M., Lange, T. & Oosterwijk, J., 2012, IACR. 20 p. (Cryptology ePrint Archive; vol. 2012/549)

Research output: Book/ReportReportAcademic

12 Citations (Scopus)
1 Downloads (Pure)

Never trust a bunny

Bernstein, D. J. & Lange, T., 2012, IACR. 12 p. (Cryptology ePrint Archive; vol. 2012/355)

Research output: Book/ReportReportAcademic

Non-uniform cracks in the concrete: the power of free precomputation

Bernstein, D. J. & Lange, T., 2012, IACR. 21 p. (Cryptology ePrint Archive; vol. 2012/318)

Research output: Book/ReportReportAcademic

The new SHA-3 software shootout

Bernstein, D. J. & Lange, T., 2012, IACR. 13 p. (Cryptology ePrint Archive; vol. 2012/004)

Research output: Book/ReportReportAcademic

10 Downloads (Pure)

Two grumpy giants and a baby

Bernstein, D. J. & Lange, T., 2012, IACR. 16 p. (Cryptology ePrint Archive; vol. 2012/294)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)

Usable assembly language for GPUs : a success story

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2012, IACR. 10 p. (Cryptology ePrint Archive; vol. 2012/137)

Research output: Book/ReportReportAcademic

2011

Faster 2-regular information-set decoding

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, IACR. (Cryptology ePrint Archive; vol. 2011/120)

Research output: Book/ReportReportAcademic

6 Citations (Scopus)

High-speed high-security signatures

Bernstein, D. J., Duif, N., Lange, T., Schwabe, P. & Yang, B. Y., 2011, IACR. 21 p. (Cryptology ePrint Archive; vol. 2011/368)

Research output: Book/ReportReportAcademic

61 Citations (Scopus)

On the correct use of the negation map in the Pollard rho method

Bernstein, D. J., Lange, T. & Schwabe, P., 2011, IACR. 26 p. (Cryptology ePrint Archive; vol. 2011/003)

Research output: Book/ReportReportAcademic

23 Citations (Scopus)

Really fast syndrome-based hashing

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, IACR. 19 p. (Cryptology ePrint Archive; vol. 2011/074)

Research output: Book/ReportReportAcademic

10 Citations (Scopus)
2 Downloads (Pure)

The security impact of a new cryptographic library

Bernstein, D. J., Lange, T. & Schwabe, P., 2011, IACR. (Cryptology ePrint Archive; vol. 2011/646)

Research output: Book/ReportReportAcademic

Wild McEliece Incognito

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, IACR. 13 p. (Cryptology ePrint Archive; vol. 2011/502)

Research output: Book/ReportReportAcademic

15 Citations (Scopus)
1 Downloads (Pure)
2010

Ball-collision decoding

Bernstein, D. J., Lange, T. & Peters, C. P., 2010, IACR. (Cryptology ePrint Archive; vol. 2010/585)

Research output: Book/ReportReportAcademic

Cryptanalysis of Skein

Bernstein, D. J. & Lange, T., 2010, IACR. 10 p. (Cryptology ePrint Archive; vol. 2010/623)

Research output: Book/ReportReportAcademic

1 Downloads (Pure)

Starfish on strike

Bernstein, D. J., Birkner, P. & Lange, T., 2010, IACR. 17 p. (Cryptology ePrint Archive; vol. 2010/367)

Research output: Book/ReportReportAcademic

5 Citations (Scopus)

Type-II optimal polynomial bases

Bernstein, D. J. & Lange, T., 2010, IACR. 17 p. (Cryptology ePrint Archive; vol. 2010/069)

Research output: Book/ReportReportAcademic

13 Citations (Scopus)
1 Downloads (Pure)

Wild McEliece

Bernstein, D. J., Lange, T. & Peters, C. P., 2010, IACR. 17 p. (Cryptology ePrint Archive; vol. 2010/410)

Research output: Book/ReportReportAcademic

2009

A complete set of addition laws for incomplete Edwards curves

Bernstein, D. J. & Lange, T., 2009, IACR. 13 p. (Cryptology ePrint Archive; vol. 2009/580)

Research output: Book/ReportReportAcademic

Breaking ECC2K-130

Bailey, D. V., Batina, L., Bernstein, D. J., Birkner, P., Bos, J. W., Chen, H-C., Cheng, C. M., Damme, van, G., De Meulenaer, G., Dominguez Perez, L. J., Fan, J., Güneysu, T., Gurkaynak, F., Lange, T., Mentens, N., Niederhagen, R. F., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L. & 2 others, Van Herrewege, A. & Yang, B. Y., 2009, IACR. 19 p. (Cryptology ePrint Archive; vol. 2009/541)

Research output: Book/ReportReportAcademic

Faster computation of Tate pairings

Arène, C., Lange, T., Naehrig, M. & Ritzenthaler, C., 2009, IACR. 21 p. (Cryptology ePrint Archive; vol. 2009/155)

Research output: Book/ReportReportAcademic

2 Downloads (Pure)