Coderingstheorie en Cryptografie

  • P.O. Box 513, Department of Mathematics and Computer Science

    5600 MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Rapport
2019

Quantum indistinguishability of random sponges

Czajkowski, J., Hülsing, A. & Schaffner, C., 2019, IACR. 36 blz. (Cryptology ePrint Archive; nr. 2019/069)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
17 Downloads (Pure)
2018

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 blz. (Cryptology ePrint Archive; vol. 2018/383)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
44 Downloads (Pure)

Hilbert modular polynomials

Martindale, C. R., 2018

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
24 Downloads (Pure)

Optimal TNFS-secure pairings on elliptic curves with even embedding degree

Martindale, C. R. & Fotiadis, G., 2018, 30 blz. (Cryptology ePrint archive; vol. 2018/969)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
13 Downloads (Pure)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 2018, IACR. 56 blz. (Cryptology ePrint Archive; vol. 2018/1059)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
53 Downloads (Pure)
2017

Double-base scalar multiplication revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2017, s.l.: IACR. 38 blz. (Cryptology ePrint Archive; vol. 2017/037)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
38 Downloads (Pure)

"HILA5 pindakaas" : on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L. S., 2017, s.l.: IACR. 14 blz. (Cryptology ePrint Archive; vol. 2017/1214)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
114 Downloads (Pure)

Lattice klepto : turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, s.l.: IACR. 19 blz. (Cryptology ePrint Archive ; vol. 2017/1140)

Onderzoeksoutput: Boek/rapportRapportAcademic

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 43 blz. (Cryptology ePrint Archive; vol. 2017/293)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
75 Downloads (Pure)

Post-quantum cryptography : dealing with the fallout of physics success

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 20 blz. (Cryptology ePrint Archive; vol. 2017/314)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
233 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 blz. (Cryptology ePrint Archive; vol. 2017/1025)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
70 Downloads (Pure)
2016

(In-)Secure messaging with the Silent Circle instant messaging protocol

Verschoor, S. R. & Lange, T., 2016, s.l.: IACR. 19 blz. (Cryptology ePrint Archive; vol. 2016/703)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
17 Downloads (Pure)

Faster discrete logarithms on FPGAs

Bernstein, D. J., Engels, S., Lange, T., Niederhagen, R., Paar, C., Schwabe, P. & Zimmermann, R., 2016, s.l.: IACR. 16 blz. (Cryptology ePrint Archive; vol. 2016/382)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
67 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 blz. (Cryptology ePrint Archive ; vol. 2016/300)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
153 Downloads (Pure)

NTRU Prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2016, s.l.: IACR. 55 blz. (Cryptology ePrint Archive; vol. 2016/461)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
57 Downloads (Pure)
2015

A characterization of MDS codes that have an error correcting pair

Márquez-Corbella, I. & Pellikaan, G. R., 2015, s.n. 29 blz. (arXiv; vol. 1508.02187 [math.AG])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
60 Downloads (Pure)

ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2015, s.l.: IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/1042)

Onderzoeksoutput: Boek/rapportRapportAcademic

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 blz. (Cryptology ePrint Archive; vol. 2015/151)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
2 Citaten (Scopus)
190 Downloads (Pure)

Computation of integral bases

Bauch, J. H. P., 2015, s.n. 23 blz. (arXiv; vol. 1507.04058 [math.NT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
91 Downloads (Pure)

Dual EC : a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R. F., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/767)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
311 Downloads (Pure)

EdDSA for more curves

Bernstein, D. J., Josefsson, S., Lange, T., Schwabe, P. & Yang, B. Y., 2015, IACR. 5 blz. (Cryptology ePrint Archive; vol. 2015/677)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
154 Downloads (Pure)

Efficient (ideal) lattice sieving using cross-polytope LSH

Becker, A. & Laarhoven, T. M. M., 2015, IACR. 26 blz. (Cryptology ePrint Archive; vol. 2015/823)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
126 Downloads (Pure)

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, IACR. 15 blz. (Cryptology ePrint Archive; vol. 2015/211)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
161 Downloads (Pure)

Guaranteeing correctness in privacy-friendly outsourcing by certificate validation

Schoenmakers, B. & Veeningen, M. G., 2015, s.n. 20 blz. (Cryptology ePrint Archive; vol. 2015/339)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
55 Downloads (Pure)

Investigating SRAM PUFs in large CPUs and GPUs

Aubel, Van, P., Bernstein, D. J. & Niederhagen, R. F., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/760)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
2 Citaten (Scopus)
99 Downloads (Pure)

McBits: fast constant-time code-based cryptography

Bernstein, D. J., Chou, T. & Schwabe, P., 2015, IACR. 26 blz. (Cryptology ePrint Archive; vol. 2015/610)

Onderzoeksoutput: Boek/rapportRapportAcademic

Multi-user Schnorr security, revisited

Bernstein, D. J., 2015, IACR. 19 blz. (Cryptology ePrint Archive; vol. 2015/996)

Onderzoeksoutput: Boek/rapportRapportAcademic

Optimal sequential fingerprinting: Wald vs. Tardos

Laarhoven, T. M. M., 2015, s.n. 12 blz. (arXiv; vol. 1502.03722 [cs.CR])

Onderzoeksoutput: Boek/rapportRapportAcademic

PALPAS ± PAsswordLess PAssword Synchronization

Horsch, M., Hülsing, A. T. & Buchmann, J., 2015, s.n. 11 blz. (arXiv; vol. 1506.04549 [cs.CR])

Onderzoeksoutput: Boek/rapportRapportAcademic

Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP

Mariano, A., Laarhoven, T. & Bischof, C., 2015, s.n. 10 blz. (Cryptology ePrint Archive; vol. 2015/041)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
90 Downloads (Pure)

Practical and optimal LSH for angular distance

Andoni, A., Indyk, P., Laarhoven, T. M. M., Razenshteyn, I. & Schmidt, L., 2015, 21 blz. (arXiv; vol. 1509.02897 [cs.DS])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
112 Citaten (Scopus)
42 Downloads (Pure)

Semantic security and indistinguishability in the quantum world

Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2015, s.n. 32 blz. (arXiv; vol. 1504.05255 [cs.CR])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
74 Downloads (Pure)

Tighter, faster, simpler side-channel security evaluations beyond computing power

Bernstein, D. J., Lange, T. & Vredendaal, van, C., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/221)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
204 Downloads (Pure)

Trinocchio : privacy-friendly outsourcing by distributed verifiable computation

Schoenmakers, B., Veeningen, M. G. & Vreede, de, N., 2015, s.n. 34 blz. (Cryptology ePrint Archive; vol. 2015/480)

Onderzoeksoutput: Boek/rapportRapportAcademic

Universally verifiable multiparty computation from threshold homomorphic cryptosystems

Schoenmakers, B. & Veeningen, M. G., 2015, s.n. 32 blz. (Cryptology ePrint Archive; vol. 2015/058)

Onderzoeksoutput: Boek/rapportRapportAcademic

9 Citaten (Scopus)
1 Downloads (Pure)
2014

A polynomial time attack against algebraic geometry code based public key cryptosystems

Couvreur, A., Márquez-Corbella, I. & Pellikaan, G. R., 2014, s.n. 11 blz. (arXiv.org; vol. 1401.6025 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
17 Citaten (Scopus)
102 Downloads (Pure)

Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders

Laarhoven, T. M. M., 2014, 14 blz. (arXiv.org; vol. 1404.2825 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
61 Downloads (Pure)

Asymptotics of fingerprinting and group testing: tight bounds from channel capacities

Laarhoven, T. M. M., 2014, 14 blz. (arXiv.org; vol. 1404.2576 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
60 Downloads (Pure)

Batch NFS

Bernstein, D. J. & Lange, T., 2014, IACR. 24 blz. (Cryptology ePrint Archive; vol. 2014/921)

Onderzoeksoutput: Boek/rapportRapportAcademic

Capacities and capacity-achieving decoders for various fingerprinting games

Laarhoven, T. M. M., 2014, s.n. 13 blz. (arXiv.org; vol. 1401.5688 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
12 Citaten (Scopus)
69 Downloads (Pure)

Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes

Couvreur, A., Márquez-Corbella, I. & Pellikaan, G. R., 2014, s.n. 8 blz. (arXiv.org; vol. 1409.8220 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Bestand
31 Downloads (Pure)

Curve41417: Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, IACR. 19 blz. (Cryptology ePrint Archive; vol. 2014/526)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
16 Citaten (Scopus)
341 Downloads (Pure)

Explicit optimal binary pebbling for one-way hash chain reversal

Schoenmakers, B., 2014, IACR. 16 blz. (Cryptology ePrint Archive; vol. 2014/329)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
80 Downloads (Pure)

Faster binary-field multiplication and faster binary-field MACs

Bernstein, D. J. & Chou, T., 2014, IACR. 20 blz. (Cryptology ePrint Archive; vol. 2014/729)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
38 Downloads (Pure)

Finding shortest lattice vectors faster using quantum search

Laarhoven, T. M. M., Mosca, M. & Pol, van de, J., 2014, 26 blz. (Cryptology ePrint Archive; vol. 2014/907)

Onderzoeksoutput: Boek/rapportRapportAcademic

1 Downloads (Pure)

How to manipulate curve standards : a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 blz. (Cryptology ePrint Archive; vol. 2014/571)

Onderzoeksoutput: Boek/rapportRapportAcademic

3 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, IACR. 21 blz. (Cryptology ePrint Archive; vol. 2014/379)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
98 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2014, IACR. 15 blz. (Cryptology ePrint Archive; vol. 2014/565)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
110 Downloads (Pure)

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, IACR. 21 blz. (Cryptology ePrint Archive; vol. 2014/134)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
31 Citaten (Scopus)
81 Downloads (Pure)

Sieving for shortest vectors in lattices using angular locality-sensitive hashing

Laarhoven, T. M. M., 2014, IACR. 24 blz. (Cryptology ePrint Archive; vol. 2014/744)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
36 Downloads (Pure)