• 955
    Citations - based on content available in repository [source: Scopus]
20112023

Content available in repository

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    Dual Lattice Attacks for Closest Vector Problems (with Preprocessing).

    Laarhoven, T. & Walter, M., 2021, Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings. Paterson, K. G. (ed.). p. 478-502 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12704 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2020

    Polytopes, lattices, and spherical codes for the nearest neighbor problem

    Laarhoven, T., 1 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 76:1-76:14 14 p. 76. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPP.

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2020, Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Nitaj, A. & Youssef, A. (eds.). Springer Gabler, p. 301-320 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier

    Ducas, L., Laarhoven, T. & van Woerden, W. P. J., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer Gabler, p. 3-36 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)
  • 2019

    Evolutionary techniques in lattice sieving algorithms

    Laarhoven, T., 2019, IJCCI 2019 - Proceedings of the 11th International Joint Conference on Computational Intelligence. Merelo, J. J., Garibaldi, J., Linares-Barranco, A., Madani, K., Warwick, K. & Warwick, K. (eds.). Setúbal: SciTePress Digital Library, p. 31-39 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    3 Citations (Scopus)
    91 Downloads (Pure)
  • Finding closest lattice vectors using approximate voronoi cells

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    9 Citations (Scopus)
    1 Downloads (Pure)
  • Nearest neighbor decoding for Tardos fingerprinting codes

    Laarhoven, T. M. M., 2 Jul 2019, IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York: Association for Computing Machinery, Inc, p. 182-187 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Round5: compact and fast post-quantum public-key encryption

    Baan, H., Bhattacharya, S., Fluhrer, S., Garcia-Morchon, O., Laarhoven, T. M. M., Rietman, R., Saarinen, M. J. O., Tolhuizen, L. & Zhang, Z., 14 Jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 83-102 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    15 Citations (Scopus)
    1 Downloads (Pure)
  • 2018

    Graph-based time-space trade-offs for approximate near neighbors

    Laarhoven, T., 1 Jun 2018, 34th International Symposium on Computational Geometry, SoCG 2018. Toth, C. D. & Speckmann, B. (eds.). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 14 p. 57. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 99).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    4 Citations (Scopus)
    35 Downloads (Pure)
  • Progressive lattice sieving

    Laarhoven, T. & Mariano, A., 2018, Post-Quantum Cryptography : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Dordrecht: Springer, p. 292-311 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    29 Citations (Scopus)
  • Speed-ups and time–memory trade-offs for tuple lattice sieving

    Herold, G., Kirshanova, E. & Laarhoven, T., 1 Mar 2018, Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I. Abdalla, M. & Dahab, R. (eds.). Dordrecht: Springer, p. 407-436 30 p. (LNCS; vol. 10769).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    14 Citations (SciVal)
  • 2017

    A parallel variant of LDSieve for the SVP on lattices

    Mariano, A., Laarhoven, T. & Bischof, C., 26 Apr 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2017, St. Petersburg, Russia, 6-8 March 2017 : Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 23-30 8 p. 7912621

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    14 Citations (Scopus)
  • Hypercube LSH for approximate near neighbors

    Laarhoven, T., 1 Nov 2017, 42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017. Larsen, K. G., Bodlaender, H. L. & Raskin, J. F. (eds.). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 7:1-7:20 20 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 83).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Optimal hashing-based time-space trade-offs for approximate near neighbors

    Andoni, A., Laarhoven, T., Razenshteyn, I. & Waingarten, E., 4 Jan 2017, 28th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017. Klein, P. N. (ed.). Society for Industrial and Applied Mathematics (SIAM), p. 47-66 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    72 Citations (Scopus)
    1 Downloads (Pure)
  • 2016

    Efficient (Ideal) lattice sieving using cross-polytope LSH

    Becker, A. & Laarhoven, T., 2016, Progress in Cryptology – AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. Pointcheval, D., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    17 Citations (Scopus)
  • New directions in nearest neighbor searching with applications to lattice sieving

    Becker, A., Ducas, L., Gama, N. & Laarhoven, T., 1 Jan 2016, 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016. New York: Association for Computing Machinery, Inc, p. 10-24 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    175 Citations (Scopus)
  • New directions in nearest neighbor searching with applications to lattice sieving.

    Becker, A., Ducas, L., Gama, N. & Laarhoven, T., 2016, SODA. p. 10-24 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Sieving for closest lattice vectors (with preprocessing)

    Laarhoven, T., 16 Jul 2016, Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Avanzi, R. & Heys, H. (eds.). Dordrecht: Springer, p. 523-542 20 p. (LNCS; vol. 10532).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    10 Citations (Scopus)
    90 Downloads (Pure)
  • 2015

    Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

    Laarhoven, T. & Weger, B. D., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Berlin: Springer, p. 101-118 18 p. (Lecture Notes in Computer Science; vol. 9230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    28 Citations (Scopus)
  • Optimal sequential fingerprinting: Wald vs. Tardos

    Laarhoven, T., 2015, 3rd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'15, Portland OR, USA, June 17-19, 2015). New York: Association for Computing Machinery, Inc, p. 97-107 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Parallel (probable) lock-free hash sieve: a practical sieving algorithm for the SVP

    Mariano, A., Bischof, C. & Laarhoven, T., 8 Dec 2015, 2015 44th International Annual Conference on Parallel Processing, ICPP 2015, 1-4 September 2015, Bejing, China. Piscataway: Institute of Electrical and Electronics Engineers, p. 590-599 10 p. 7349614

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    24 Citations (Scopus)
  • Practical and optimal LSH for angular distance

    Andoni, A., Indyk, P., Laarhoven, T. M. M., Razenshteyn, I. & Schmidt, L., 7 Dec 2015, Advances in Neural Information Processing Systems (NIPS, Montreal, Canada, December 7-10, 2015). Cortes, C., Lawrence, N. D., Lee, D. D., Sugiyama, M. & Garnett, R. (eds.). s.l.: Curran Associates, p. 1225-1233 9 p. (Advances in Neutral Information Processing Systems; vol. 28).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    250 Citations (SciVal)
  • Practical and Optimal LSH for Angular Distance.

    Andoni, A., Indyk, P., Laarhoven, T., Razenshteyn, I. P. & Schmidt, L., 2015, NIPS. p. 1225-1233 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Sieving for shortest vectors in lattices using angular locality-sensitive hashing

    Laarhoven, T., 2015, Advances in Cryptology - CRYPTO 2015 (35th Annual Cryptology Conference, Santa Barbara CA, USA, August 16-20, 2015). Gennaro, R. & Robshaw, M. (eds.). Berlin: Springer, Vol. 1. p. 3-22 20 p. (Lecture Notes in Computer Science; vol. 9215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    64 Citations (Scopus)
  • 2014

    Asymptotics of fingerprinting and group testing (Extended abstract)

    Laarhoven, T. M. M., 2014, 4th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux (Eindhoven, The Netherlands, May 12-13, 2014). Skoric, B. & Ignatenko, T. (eds.). Eindhoven: Technische Universiteit Eindhoven, p. 70-72

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    34 Downloads (Pure)
  • Capacities and capacity-achieving decoders for various fingerprinting games

    Laarhoven, T., 2014, 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'14, Salzburg, Austria, June 11-13, 2014). New York NY: Association for Computing Machinery, Inc, p. 123-134 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    16 Citations (Scopus)
  • Tuple decoders for traitor tracing schemes

    Oosterwijk, J-J., Doumen, J. & Laarhoven, T. M. M., 2014, Media Watermarking, Security, and Forensics 2014 (San Francisco CA, USA, February 3-5, 2014). SPIE, 21 p. 90280C. (Proceedings of SPIE; vol. 9028).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • 2013

    Discrete distributions in the Tardos scheme, revisited

    Laarhoven, T. & Weger, B. D., 2013, First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13, Montpellier, France, June 17-19, 2013). New York NY: Association for Computing Machinery, Inc, p. 13-17 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
  • Dynamic traitor tracing schemes, revisited

    Laarhoven, T., 18 Nov 2013, Information Forensics and Security (WIFS), 2013 IEEE International Workshop. Institute of Electrical and Electronics Engineers, p. 191-196 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
  • Efficient probabilistic group testing based on traitor tracing

    Laarhoven, T., 2013, 51st Annual Allerton Conference on Communication, Control, and Computing (Monticello IL, USA, October 2-3, 2013). Piscataway: Institute of Electrical and Electronics Engineers, p. 1458-1465 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    11 Citations (Scopus)
  • Solving the shortest vector problem in lattices faster using quantum search

    Laarhoven, T. M. M., Mosca, M. & van de Pol, J., 2013, Post-Quantum Cryptography - 5th International Workshop (PQ Crypto 2013, Limoges, France, June 4-7, 2013. Proceedings). Gaborit, P. (ed.). Berlin: Springer, p. 83-101 19 p. (Lecture Notes in Computer Science; vol. 7932).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    18 Citations (Scopus)
  • 2012

    Dynamic traitor tracing for arbitrary alphabets: divide and conquer

    Laarhoven, T., Oosterwijk, J-J. & Doumen, J., 2012, Proceedings of the International Workshop on Information Forensics and Security (WIFS, Tenerife, Spain, December 2-5, 2012). Piscataway: Institute of Electrical and Electronics Engineers, p. 240-245 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    10 Citations (Scopus)
    184 Downloads (Pure)