If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Citations (Scopus)
58 Downloads (Pure)
2018

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

25 Citations (Scopus)

HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
6 Citations (Scopus)
2 Downloads (Pure)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2017

Lattice klepto: Turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Dordrecht: Springer, p. 336-354 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

NTRU prime: reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Berlin: Springer, p. 235-260 26 p. (Lecture Notes in Computer Science; vol. 10719).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

15 Citations (Scopus)

Short generators without quantum computers: the case of multiquadratics

Bauch, J., Bernstein, D. J., de Valence, H., Lange, T. & van Vredendaal, C., 2017, Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. Coron, J-S. & Nielsen, J. B. (eds.). Dordrecht: Springer, p. 27-59 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10210 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Sliding right into disaster : left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Homma, N. & Fischer, W. (eds.). Dordrecht: Springer, p. 555-576 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10529 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)
2016

Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, Vol. 9813. p. 323-345 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

58 Citations (Scopus)
2015

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

How to manipulate curve standards: a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Berlin: Springer, p. 109-139 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
3 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2015, Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers. Joye, M. & Moradi, A. (eds.). Berlin: Springer, p. 104-121 (Lecture Notes in Computer Science; vol. 8968).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

SPHINCS : practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (eds.). Berlin: Springer, p. 368-397 (Lecture Notes in Computer Science; vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

93 Citations (Scopus)

TweetNaCl : a crypto library in 100 tweets

Bernstein, D. J., van Gastel, B., Janssen, W., Lange, T., Schwabe, P. & Smetsers, S., 2015, Progress in Cryptology - LATINCRYPT 2014 (Third International Conference on Cryptology and Information Security in Latin America, Florianópolis, Brazil, September 17-19, 2014. Revised Selected Papers). Aranha, D. F. & Menezes, A. (eds.). Berlin: Springer, p. 64-83 (Lecture Notes in Computer Science; vol. 8895).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)

Twisted Hessian curves

Bernstein, D. J., Chuengsatiansup, C., Kohel, D. & Lange, T., 2015, Progress in Cryptology - LATINCRYPT 2015 (4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Cham: Springer, p. 269-294 26 p. (Lecture Notes in Computer Science; vol. 9230).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

18 Citations (Scopus)
2014

Batch NFS

Bernstein, D. J. & Lange, T., 2014, Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Joux, A. & Youssef, A. (eds.). Springer, p. 38-58 (Lecture Notes in Computer Science; vol. 8781).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Curve41417 : Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings). Batina, L. & Robshaw, M. (eds.). Berlin: Springer, p. 316-334 (Lecture Notes in Computer Science; vol. 8731).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, Advances in Cryptology - ASIACRYPT 2014 (20th International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2014, Kaohsiung, Taiwan. Proceedings, Part I). Sarkar, P. & Iwata, T. (eds.). Berlin: Springer, p. 317-337 (Lecture Notes in Computer Science; vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)
2 Downloads (Pure)

On the practical exploitability of dual EC in TLS implementations

Checkoway, S., Fredrikson, M., Niederhagen, R. F., Everspaugh, A., Green, M., Lange, T., Ristenpart, T., Bernstein, D. J., Maskiewicz, J. & Shacham, H., 2014, Proceedings of the 23rd USENIX Security Symposium 20-22 August 2014, San Diego CA, USA. Usenix Association, p. 319-335

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

54 Citations (Scopus)
2013

Elligator : elliptic-curve points indistinguishable from uniform random strings

Bernstein, D. J., Hamburg, M., Krasnova, A. & Lange, T., 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013). Sadeghi, A-R., Gligor, V. D. & Yung, M. (eds.). New York: Association for Computing Machinery, Inc, p. 967-979

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

48 Citations (Scopus)

Factoring RSA keys from certified smart cards : Coppersmith in the wild

Bernstein, D. J., Chang, Y. A., Cheng, C. M., Chou, L. P., Heninger, N., Lange, T. & Someren, van, N., 2013, Advances in Cryptology - ASIACRYPT 2013 (19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013. Proceedings). Sako, K. & Sarkar, P. (eds.). Berlin: Springer, Vol. 3. p. 341-360 (Lecture Notes in Computer Science; vol. 8270).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

45 Citations (Scopus)
2 Downloads (Pure)

MinimaLT : minimal-latency networking through better security

Petullo, W. M., Zhang, X., Solworth, J. A., Bernstein, D. J. & Lange, T., 2013, Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013). New York: Association for Computing Machinery, Inc, p. 425-438

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)
1 Downloads (Pure)

Never trust a bunny

Bernstein, D. J. & Lange, T., 2013, Radio Frequency Identification. Security and Privacy Issues (8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers). Hoepman, J. H. & Verbauwhede, I. (eds.). Berlin: Springer, p. 137-148 (Lecture Notes in Computer Science; vol. 7739).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

17 Citations (Scopus)

Non-uniform cracks in the concrete : the power of free precomputation

Bernstein, D. J. & Lange, T., 2013, Advances in Cryptology - ASIACRYPT 2013 (19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013. Sako, K. & Sarkar, P. (eds.). Berlin: Springer, Vol. 3. p. 321-340 (Lecture Notes in Computer Science; vol. 8270).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

26 Citations (Scopus)

Quantum algorithms for the subset-sum problem

Bernstein, D. J., Jeffery, S., Lange, T. & Meurer, A., 2013, Post-Quantum Cryptography - 5th International Workshop (PQ Crypto 2013, Limoges, France, June 4-7, 2013. Proceedings). Gaborit, P. (ed.). Berlin: Springer, p. 16-33 (Lecture Notes in Computer Science; vol. 7932).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

17 Citations (Scopus)
1 Downloads (Pure)

Two grumpy giants and a baby

Bernstein, D. J. & Lange, T., 2013, ANTS X (Proceedings of the Tenth Algorithmic Number Theory Symposium, San Diego, California, July 9-13, 2012). Howe, E. W. & Kedlaya, K. S. (eds.). Berkeley: Mathematical Sciences Publishers, p. 87-111 (The Open Book Series; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)
2012

Computing small discrete logarithms faster

Bernstein, D. J. & Lange, T., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (eds.). Berlin: Springer, p. 318-338 (Lecture Notes in Computer Science; vol. 7668).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

17 Citations (Scopus)

Faster batch forgery identification

Bernstein, D. J., Doumen, J. M., Lange, T. & Oosterwijk, J., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (eds.). Berlin: Springer, p. 454-473 (Lecture Notes in Computer Science; vol. 7668).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

The new SHA-3 software shootout

Bernstein, D. J. & Lange, T., 2012, Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012). Gaithersburg MD: National Institute of Standards and Technology (NIST), p. 1-13

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
45 Downloads (Pure)

The security impact of a new cryptographic library

Bernstein, D. J., Lange, T. & Schwabe, P., 2012, Progress in Cryptology - LATINCRYPT 2012 (2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings). Hevia, A. & Neven, G. (eds.). Berlin: Springer, p. 159-176 (Lecture Notes in Computer Science; vol. 7533).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

91 Citations (Scopus)
2011

Elliptic curves for applications (Tutorial)

Lange, T., 2011, Progress in Cryptology - INDOCRYPT 2011 (12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings). Bernstein, D. J. & Chatterjee, S. (eds.). Berlin: Springer, p. 2-2 (Lecture Notes in Computer Science; vol. 7107).

Research output: Chapter in Book/Report/Conference proceedingConference contributionProfessional

2 Downloads (Pure)

Faster 2-regular information-set decoding

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, Coding and Cryptology (Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings). Chee, Y. M. (ed.). Berlin: Springer, p. 81-98 (Lecture Notes in Computer Science; vol. 6639).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

High-speed high-security signatures

Bernstein, D. J., Duif, N., Lange, T., Schwabe, P. & Yang, B. Y., 2011, Cryptographic Hardware and Embedded Systems - CHES 2011 (13th International Workshop, Nara, Japan, September 28–October 1, 2011. Proceedings). Preneel, B. & Takagi, T. (eds.). Berlin: Springer, p. 124-142 (Lecture Notes in Computer Science; vol. 6917).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

61 Citations (Scopus)

On the correct use of the negation map in the Pollard rho method

Bernstein, D. J., Lange, T. & Schwabe, P., 2011, Public Key Cryptography - PKC 2011 (14th International Conference on Practice and Theory in Public-Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings). Catalano, D., Fazio, N., Gennaro, R. & Nicolosi, A. (eds.). Berlin: Springer, p. 128-146 (Lecture Notes in Computer Science; vol. 6571).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

23 Citations (Scopus)

Really fast syndrome-based hashing

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, Progress in Cryptology - AfricaCrypt 2011 (4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings). Nitaj, A. & Pointcheval, D. (eds.). Berlin: Springer, p. 134-152 (Lecture Notes in Computer Science; vol. 6737).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

Smaller decoding exponents : ball-collision decoding

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Advances in Cryptology - CRYPTO 2011 (31st Annual International Cryptology Conference, Santa Barbara CA, USA, August 14-18, 2011. Proceedings). Rogaway, P. (ed.). Berlin: Springer, p. 743-760 (Lecture Notes in Computer Science; vol. 6841).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

76 Citations (Scopus)

Wild McEliece

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers). Biryukov, A., Gong, G. & Stinson, D. R. (eds.). Berlin: Springer, p. 143-158 (Lecture Notes in Computer Science; vol. 6544).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)
1 Downloads (Pure)

Wild McEliece Incognito

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings). Yang, B. Y. (ed.). Berlin: Springer, p. 244-254 (Lecture Notes in Computer Science; vol. 7071).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

15 Citations (Scopus)
2010

ECC2K-130 on NVIDIA GPUs

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2010, Progress in Cryptology - INDOCRYPT 2010 (11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings). Gong, G. & Gupta, K. C. (eds.). Berlin: Springer, p. 328-346 (Lecture Notes in Computer Science; vol. 6498).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
12 Citations (Scopus)
196 Downloads (Pure)

Faster pairing computations on curves with high-degree twists

Costello, C., Lange, T. & Naehrig, M., 2010, Public Key Cryptography - PKC 2010 (13th International Conference on Practice and Theory in Public-Key Cryptography, Paris, France, May 26-28, 2010. Proceedings). Nguyen, P. Q. & Pointcheval, D. (eds.). Berlin: Springer, p. 224-242 (Lecture Notes in Computer Science; vol. 6056).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

56 Citations (Scopus)

Starfish on strike

Bernstein, D. J., Birkner, P. & Lange, T., 2010, Progress in Cryptology - LATINCRYPT 2010 (First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010. Proceedings). Abdalla, M. & Barretto, P. S. L. M. (eds.). Berlin: Springer, p. 61-80 (Lecture Notes in Computer Science; vol. 6212).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)

Type-II optimal polynomial bases

Bernstein, D. J. & Lange, T., 2010, Arithmetic of Finite Fields (Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings). Hasan, M. A. & Helleseth, T. (eds.). Berlin: Springer, p. 41-61 (Lecture Notes in Computer Science; vol. 6087).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)
1 Downloads (Pure)
2009

ECM on graphics cards

Bernstein, D. J., Chen, T. R., Cheng, C. M., Lange, T. & Yang, B. Y., 2009, Advances in Cryptology - Eurocrypt 2009 (28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings). Joux, A. (ed.). Berlin: Springer, p. 483-501 (Lecture Notes in Computer Science; vol. 5479).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

44 Citations (Scopus)

Explicit bounds for generic decoding algorithms for code-based cryptography

Bernstein, D. J., Lange, T., Peters, C. P. & Tilborg, van, H. C. A., 2009, International Workshop on Coding and Cryptography (WCC 2009, Ullensvang, Norway, May 10-15, 2009. Pre-proceedings). Bergen: Selmer Center, University of Bergen, p. 168-180

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Downloads (Pure)

FSBday : Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

Bernstein, D. J., Lange, T., Niederhagen, R. F., Peters, C. P. & Schwabe, P., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptographic Systems, Lausanne, Switzerland, September 9-10, 2009). p. 85-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

FSBday : Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

Bernstein, D. J., Lange, T., Niederhagen, R. F., Peters, C. P. & Schwabe, P., 2009, Progress in Cryptology - INDOCRYPT 2009 (Proceedings 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009). Roy, B. & Sendrier, N. (eds.). Berlin: Springer, p. 18-38 (Lecture Notes in Computer Science; vol. 5922).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
15 Downloads (Pure)

The billion-mulmod-per-second PC

Bernstein, D. J., Chen, H-C., Chen, M. S., Cheng, C. M., Hsiao, C. H., Lange, T., Lin, Z. C. & Yang, B. Y., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptograhic Systems, Lausanne, Switserland, September 9-10, 2009). p. 131-144

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

The Certicom challenges ECC2-X

Bailey, D. V., Baldwin, B., Batina, L., Bernstein, D. J., Birkner, P., Bos, J. W., Damme, van, G., De Meulenaer, G., Fan, J., Güneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Paar, C., Regazzoni, F., Schwabe, P. & Uhsadel, L., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptographic Systems, Lausanne, Switzerland, September 9-10, 2009). p. 51-82

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)
2008

Analysis and optimization of elliptic-curve single-scalar multiplication

Bernstein, D. J. & Lange, T., 2008, Finite Fields and Applications (Proceedings 8th International Conference, Fq8, Melbourne, Australia, July 9-13, 2007). Mullen, G. L., Panario, D. & Shparlinski, I. E. (eds.). Providence RI: American Mathematical Society, p. 1-20 (Contemporary Mathematics Series; vol. 461).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Attacking and defending the McEliece cryptosystem

Bernstein, D. J., Lange, T. & Peters, C. P., 2008, Post-Quantum Cryptography (2nd International Workshop, PQCrypto 2008, Cincinnati OH, USA, October 17-19, 2008, Proceedings). Buchmann, J. & Ding, J. (eds.). Berlin: Springer, p. 31-46 (Lecture Notes in Computer Science; vol. 5299).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

130 Citations (Scopus)