Coderingstheorie en Cryptografie

  • P.O. Box 513, Department of Mathematics and Computer Science

    5600 MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Conferentiebijdrage
2019

Application of complementary dual AG codes to entanglement-assisted quantum codes

Pereira, F. R. F., Pellikaan, R., La Guardia, G. G. & De Assis, F. M., 1 jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, blz. 2559-2563 5 blz. 8849685

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

A reaction attack against cryptosystems based on LRPC codes

Samardjiska, S., Santini, P., Persichetti, E. & Banegas, G., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (redactie). Cham: Springer, blz. 197-216 20 blz. (Lecture Notes in Computer Science; vol. 11774).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

DAGS: reloaded revisiting dyadic key encapsulation

Banegas, G., Barreto, P. S. L. M., Boidje, B. O., Cayrel, P-L., Dione, G. N., Gaj, K., Gueye, C. T., Haeussler, R., Klamti, J. B., Ndiaye, O., Nguyen, D. T., Persichetti, E. & Ricardini, J. E., 2019, Code-Based Cryptography - 7th International Workshop, CBC 2019, Revised Selected Papers. Baldi, M., Santini, P. & Persichetti, E. (redactie). Cham: Springer, blz. 69-85 17 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11666 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Decisional second-preimage resistance: when does SPR imply PRE?

Bernstein, D. J. & Hülsing, A., 22 nov 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (redactie). Berlin: Springer, blz. 33-62 30 blz. (Lecture notes in computer science; vol. 11923).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Don't forget your roots: Constant-time root finding over F 2 m

Martins, D., Banegas, G. & Custódio, R., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (redactie). Cham: Springer, blz. 109-129 21 blz. (Lecture Notes in Computer Science; vol. 11774).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Entanglement-assisted quantum codes from algebraic geometry codes

Fernandes Pereira, F., Pellikaan, R., Gadioli La Guardia, G. & de Assis, F. M., 2019, Proceedings of the WCC 2019: The Eleventh International Workshop on Coding and Cryptography. 10 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Evolutionary techniques in lattice sieving algorithms

Laarhoven, T., 1 jan 2019, IJCCI 2019 - Proceedings of the 11th International Joint Conference on Computational Intelligence. Merelo, J. J., Garibaldi, J., Linares-Barranco, A., Madani, K., Warwick, K. & Warwick, K. (redactie). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., blz. 31-39 9 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
27 Downloads (Pure)

Faster SeaSign signatures through improved rejection sampling

Decru, T., Panny, L. & Vercauteren, F., 14 jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (redactie). Cham: Springer, blz. 271-285 15 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)

Fast secure comparison for medium-sized integers and its application in binarized neural networks

Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (redactie). Cham: Springer, blz. 453-472 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Finding closest lattice vectors using approximate voronoi cells

Doulgerakis, E., Laarhoven, T. & de Weger, B., 1 jan 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (redactie). Cham: Springer, blz. 3-22 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

Nearest neighbor decoding for Tardos fingerprinting codes

Laarhoven, T. M. M., 2 jul 2019, IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York: Association for Computing Machinery, Inc, blz. 182-187 6 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Quantum BCH and reed-solomon entanglement-assisted codes

Fernandes Pereira, F. & Pellikaan, R., 2019, Proceedings of the 40th WIC Symposium on Information Theory in the Benelux . blz. 102 1 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (redactie). Cham: Springer, blz. 409-441 33 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
7 Citaten (Scopus)
51 Downloads (Pure)

Quantum Indistinguishability of random sponges

Czajkowski, J., Hülsing, A. & Schaffner, C., 1 jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (redactie). Cham: Springer, blz. 296-325 30 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Round5: compact and fast post-quantum public-key encryption

Baan, H., Bhattacharya, S., Fluhrer, S., Garcia-Morchon, O., Laarhoven, T. M. M., Rietman, R., Saarinen, M. J. O., Tolhuizen, L. & Zhang, Z., 14 jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (redactie). Cham: Springer, blz. 83-102 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

The SPHINCS+ signature framework

Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J. & Schwabe, P., 6 nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, blz. 2129-2146 18 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
1 Citaat (Scopus)
14 Downloads (Pure)

Tighter proofs of CCA security in the quantum random oracle model

Bindel, N., Hamburg, M., Hövelmanns, K., Hülsing, A. & Persichetti, E., 22 nov 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (redactie). Berlin: Springer, Vol. 2. blz. 61-90 30 blz. (Lecture notes in computer science; vol. 11892)(Security and cryptology; vol. 11892).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
2018

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (redactie). Berlin: Springer, blz. 395-427 33 blz. (Lecture Notes in Computer Science; vol. 11274).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

23 Citaten (Scopus)

Graph-based time-space trade-offs for approximate near neighbors

Laarhoven, T., 24 mei 2018, 34th International Symposium on Computational Geometry, SoCG 2018. Speckmann, B. & Toth, C. (redactie). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Vol. 99. blz. 1-14 57. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 99).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
1 Citaat (Scopus)
16 Downloads (Pure)

HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (redactie). Dordrecht: Springer, blz. 203-216 14 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
5 Citaten (Scopus)
2 Downloads (Pure)

Pairing-friendly twisted Hessian curves

Chuengsatiansup, C. & Martindale, C. R., 2018, Progress in Cryptology - INDOCRYPT 2018: Asymmetic Key Cryptography and Cryptanalysis. Chakraborty, D. & Iwata, T. (redactie). Berlin: Springer, blz. 228-247 20 blz. (Lecture Notes in Computer Science; vol. 11356).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Post-quantum security of the sponge construction

Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, blz. 185-204 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

8 Citaten (Scopus)

Progressive lattice sieving

Laarhoven, T. & Mariano, A., 1 jan 2018, Post-Quantum Cryptography : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lange, T. & Steinwandt, R. (redactie). Dordrecht: Springer, blz. 292-311 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (redactie). Berlin: Springer, blz. 728-757 30 blz. (Lecture Notes in Computer Science; vol. 10769).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)

SOFIA: MQ-based signatures in the QROM

Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (redactie). Springer, blz. 3-33 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

Speed-ups and time–memory trade-offs for tuple lattice sieving

Herold, G., Kirshanova, E. & Laarhoven, T., 1 mrt 2018, Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I. Abdalla, M. & Dahab, R. (redactie). Dordrecht: Springer, blz. 407-436 (LNCS; vol. 10769).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

“Oops, I did it again” – Security of one-time signatures under two-message attacks

Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Cham: Springer, blz. 299-322 24 blz. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
2017

Binary puzzle as a SAT problem

Utomo, P. H. & Pellikaan, G. R., 11 mei 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Foundational (co)datatypes and (co)recursion for higher-order logic

Biendarra, J., Blanchette, J. C., Bouzy, A., Desharnais, M., Fleury, M., Hölzl, J., Kunčar, O., Lochbihler, A., Meier, F., Panny, L., Popescu, A., Sternagel, C., Thiemann, R. & Traytel, D., 1 jan 2017, Frontiers of Combining Systems - 11th International Symposium, FroCoS 2017, Proceedings. Dixon, C. & Finger, M. (redactie). Dordrecht: Springer, blz. 3-21 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10483 LNAI).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

High-speed key encapsulation from NTRU

Hülsing, A., Rijneveld, J., Schanck, J. & Schwabe, P., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings. Springer, blz. 232-252 21 blz. (Lecture Notes in Computer Science; vol. 10529).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

Lattice klepto: Turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Dordrecht: Springer, blz. 336-354 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Low-communication parallel quantum multi-target preimage search

Banegas, G. S. & Bernstein, D. J., 23 dec 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised selected papers. Adams, C. & Camenisch, J. (redactie). Dordrecht: Springer, blz. 325-335 11 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)
1 Downloads (Pure)

NTRU prime: reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Berlin: Springer, blz. 235-260 26 blz. (Lecture Notes in Computer Science; vol. 10719).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

14 Citaten (Scopus)

Optimal hashing-based time-space trade-offs for approximate near neighbors

Andoni, A., Laarhoven, T., Razenshteyn, I. & Waingarten, E., 4 jan 2017, 28th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017. Klein, P. N. (redactie). s.l.: Society for Industrial and Applied Mathematics (SIAM), blz. 47-66 20 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
30 Citaten (Scopus)

Sliding right into disaster : left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Homma, N. & Fischer, W. (redactie). Dordrecht: Springer, blz. 555-576 22 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10529 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

11 Citaten (Scopus)

To BLISS-B or not to be : attacking strong Swan's implementation of post-quantum signatures

Pessl, P., Groot Bruinderink, L. & Yarom, Y., 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Thuraisingham, B. M., Evans, D., Malkin, T. & Xu, D. (redactie). New York: Association for Computing Machinery, Inc, blz. 1843-1855 13 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
18 Citaten (Scopus)
77 Downloads (Pure)
2016

ARMed SPHINCS computing a 41KB signature in 16KB of RAM

Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (redactie). Berlin: Springer, blz. 446-470 25 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

Efficient (Ideal) lattice sieving using cross-polytope LSH

Becker, A. & Laarhoven, T., 1 jan 2016, Progress in Cryptology – AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. Pointcheval, D., Nitaj, A. & Rachidi, T. (redactie). Dordrecht: Springer, blz. 3-23 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)

Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (redactie). Springer, Vol. 9813. blz. 323-345 23 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

58 Citaten (Scopus)

From 5-pass MQ-based identification to MQ-based signatures

Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, blz. 135-165 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 ).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

22 Citaten (Scopus)

Mitigating multi-target attacks in hash-based signatures

Hülsing, A. T., Rijneveld, J. & Song, F., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (redactie). Springer, Vol. 9614. blz. 387-416 30 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

39 Citaten (Scopus)

New directions in nearest neighbor searching with applications to lattice sieving

Becker, A., Ducas, L., Gama, N. & Laarhoven, T., 1 jan 2016, 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016. New York: Association for Computing Machinery, Inc, blz. 10-24 15 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

77 Citaten (Scopus)

Semantic security and indistinguishability in the quantum world

Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Robshaw, M. & Katz, J. (redactie). Dordrecht: Springer, blz. 60-89 30 blz. (Lecture Notes in Computer Science; vol. 9816).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

15 Citaten (Scopus)

Sieving for closest lattice vectors (with preprocessing)

Laarhoven, T., 16 jul 2016, Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Avanzi, R. & Heys, H. (redactie). Dordrecht: Springer, blz. 533-542 (LNCS; vol. 10532).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
5 Citaten (Scopus)
31 Downloads (Pure)

Trinocchio: privacy-preserving outsourcing by distributed verifiable computation

Schoenmakers, B., Veeningen, M. & De Vreede, N., 2016, Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Manulis, M., Sadeghi, A-R. & Schneider, S. (redactie). Dordrecht: Springer, blz. 346-366 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)
2015

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (redactie). Berlin: Springer, blz. 488-508 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

Binary puzzles as an erasure decoding problem

Utomo, P. H. & Pellikaan, G. R., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (redactie). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), blz. 129-134

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
223 Downloads (Pure)

Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes

Pellikaan, G. R., Marquez-Corbella, I. & Couvreur, A., 2015, Coding Theory and Applications: 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014. Pinto, R., Malonek, P. R. & Vetton, P. (redactie). Dordrecht: Springer, blz. 133-140 8 blz. (CIM Series in Mathematical Sciences ; vol. 3).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (redactie). Berlin: Springer, blz. 101-118 (Lecture Notes in Computer Science; vol. 9230).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

16 Citaten (Scopus)

How to manipulate curve standards: a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (redactie). Berlin: Springer, blz. 109-139 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)
3 Downloads (Pure)