• Postbus 513, MF

    5600MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Rapport
2020

The SCIP Optimization Suite 7.0

Gamrath, G., Anderson, D., Bestuzheva, K., Chen, W-K., Eifler, L., Gasse, M., Gemander, P., Gleixner, A., Gottwald, L., Halbig, K., Hendel, G., Hojny, C., Koch, T., Le Bodic, P., Maher, S. J., Matter, F., Miltenberger, M., Mühmer, E., Müller, B., Pfetsch, M. E. & 8 anderen, Schlösser, F., Serrano, F., Shinano, Y., Tawfik, C., Vigerske, S., Wegscheider, F., Weninger, D. & Witzig, J., 2020, Berlin: Zuse Institut Berlin. 46 blz. (ZIB-Report; vol. 20-10)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
2019

Quantum indistinguishability of random sponges

Czajkowski, J., Hülsing, A. & Schaffner, C., 2019, IACR. 36 blz. (Cryptology ePrint Archive; nr. 2019/069)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
19 Downloads (Pure)
2018

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 blz. (Cryptology ePrint Archive; vol. 2018/383)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
46 Downloads (Pure)

Hilbert modular polynomials

Martindale, C. R., 2018

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
28 Downloads (Pure)

Optimal TNFS-secure pairings on elliptic curves with even embedding degree

Martindale, C. R. & Fotiadis, G., 2018, 30 blz. (Cryptology ePrint archive; vol. 2018/969)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
14 Downloads (Pure)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 2018, IACR. 56 blz. (Cryptology ePrint Archive; vol. 2018/1059)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
55 Downloads (Pure)
2017

Double-base scalar multiplication revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2017, s.l.: IACR. 38 blz. (Cryptology ePrint Archive; vol. 2017/037)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
38 Downloads (Pure)

"HILA5 pindakaas" : on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L. S., 2017, s.l.: IACR. 14 blz. (Cryptology ePrint Archive; vol. 2017/1214)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
116 Downloads (Pure)

Lattice klepto : turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, s.l.: IACR. 19 blz. (Cryptology ePrint Archive ; vol. 2017/1140)

Onderzoeksoutput: Boek/rapportRapportAcademic

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 43 blz. (Cryptology ePrint Archive; vol. 2017/293)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
78 Downloads (Pure)

Post-quantum cryptography : dealing with the fallout of physics success

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 20 blz. (Cryptology ePrint Archive; vol. 2017/314)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
233 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 blz. (Cryptology ePrint Archive; vol. 2017/1025)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
70 Downloads (Pure)

Sliding right into disaster: left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, s.l.: IACR. 21 blz. (Cryptology ePrint Archive; vol. 2017/627)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
69 Downloads (Pure)
2016

(In-)Secure messaging with the Silent Circle instant messaging protocol

Verschoor, S. R. & Lange, T., 2016, s.l.: IACR. 19 blz. (Cryptology ePrint Archive; vol. 2016/703)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
17 Downloads (Pure)

Faster discrete logarithms on FPGAs

Bernstein, D. J., Engels, S., Lange, T., Niederhagen, R., Paar, C., Schwabe, P. & Zimmermann, R., 2016, s.l.: IACR. 16 blz. (Cryptology ePrint Archive; vol. 2016/382)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
69 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 blz. (Cryptology ePrint Archive ; vol. 2016/300)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
165 Downloads (Pure)

NTRU Prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2016, s.l.: IACR. 55 blz. (Cryptology ePrint Archive; vol. 2016/461)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
61 Downloads (Pure)
2015

A characterization of MDS codes that have an error correcting pair

Márquez-Corbella, I. & Pellikaan, G. R., 2015, s.n. 29 blz. (arXiv; vol. 1508.02187 [math.AG])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
64 Downloads (Pure)

Are there any nicely structured preference~profiles~nearby?

Bredereck, R., Chen, J. & Woeginger, G. J., 2015, arXiv.org. 26 blz. (arXiv; vol. 1509.04595 [cs.GT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
53 Downloads (Pure)

ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2015, s.l.: IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/1042)

Onderzoeksoutput: Boek/rapportRapportAcademic

Automorphism groups of Gaussian chain graph models

Draisma, J. & Zwiernik, P. W., 2015, s.n. 26 blz. (arXiv.org; vol. 1501.03013 [math.ST])

Onderzoeksoutput: Boek/rapportRapportAcademic

Bestand
4 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 blz. (Cryptology ePrint Archive; vol. 2015/151)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
2 Citaten (Scopus)
193 Downloads (Pure)

Computation of integral bases

Bauch, J. H. P., 2015, s.n. 23 blz. (arXiv; vol. 1507.04058 [math.NT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
93 Downloads (Pure)

Dual EC : a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R. F., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/767)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
317 Downloads (Pure)

EdDSA for more curves

Bernstein, D. J., Josefsson, S., Lange, T., Schwabe, P. & Yang, B. Y., 2015, IACR. 5 blz. (Cryptology ePrint Archive; vol. 2015/677)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
155 Downloads (Pure)

Efficient (ideal) lattice sieving using cross-polytope LSH

Becker, A. & Laarhoven, T. M. M., 2015, IACR. 26 blz. (Cryptology ePrint Archive; vol. 2015/823)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
129 Downloads (Pure)

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, IACR. 15 blz. (Cryptology ePrint Archive; vol. 2015/211)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
166 Downloads (Pure)

Guaranteeing correctness in privacy-friendly outsourcing by certificate validation

Schoenmakers, B. & Veeningen, M. G., 2015, s.n. 20 blz. (Cryptology ePrint Archive; vol. 2015/339)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
56 Downloads (Pure)

Investigating SRAM PUFs in large CPUs and GPUs

Aubel, Van, P., Bernstein, D. J. & Niederhagen, R. F., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/760)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
2 Citaten (Scopus)
108 Downloads (Pure)

McBits: fast constant-time code-based cryptography

Bernstein, D. J., Chou, T. & Schwabe, P., 2015, IACR. 26 blz. (Cryptology ePrint Archive; vol. 2015/610)

Onderzoeksoutput: Boek/rapportRapportAcademic

Multi-user Schnorr security, revisited

Bernstein, D. J., 2015, IACR. 19 blz. (Cryptology ePrint Archive; vol. 2015/996)

Onderzoeksoutput: Boek/rapportRapportAcademic

On the existence of identifiable reparametrizations for linear compartment models

Baaijens, J. A. & Draisma, J., 2015, s.l.: s.n. 32 blz. (arXiv; vol. vol. 1509.02551)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
53 Downloads (Pure)

On the Lovász theta function for independent sets in sparse graphs

Bansal, N., Gupta, A. & Guruganesh, G., 2015, s.n. 37 blz. (arXiv; vol. 1504.04767 [cs.DS])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
5 Citaten (Scopus)
138 Downloads (Pure)

Optimal sequential fingerprinting: Wald vs. Tardos

Laarhoven, T. M. M., 2015, s.n. 12 blz. (arXiv; vol. 1502.03722 [cs.CR])

Onderzoeksoutput: Boek/rapportRapportAcademic

PALPAS ± PAsswordLess PAssword Synchronization

Horsch, M., Hülsing, A. T. & Buchmann, J., 2015, s.n. 11 blz. (arXiv; vol. 1506.04549 [cs.CR])

Onderzoeksoutput: Boek/rapportRapportAcademic

Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP

Mariano, A., Laarhoven, T. & Bischof, C., 2015, s.n. 10 blz. (Cryptology ePrint Archive; vol. 2015/041)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
92 Downloads (Pure)

Practical and optimal LSH for angular distance

Andoni, A., Indyk, P., Laarhoven, T. M. M., Razenshteyn, I. & Schmidt, L., 2015, 21 blz. (arXiv; vol. 1509.02897 [cs.DS])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
124 Citaten (Scopus)
46 Downloads (Pure)

Regular maps of high density

Eggermont, R. H. & Hendriks, M., 2015, s.n. 13 blz. (arXiv.org; vol. 1501.03377 [math.CO])

Onderzoeksoutput: Boek/rapportRapportAcademic

Semantic security and indistinguishability in the quantum world

Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2015, s.n. 32 blz. (arXiv; vol. 1504.05255 [cs.CR])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
78 Downloads (Pure)

The data singular and the data isotropic loci for affine cones

Horobet, E., 2015, s.n. 11 blz. (arXiv; vol. 1507.0293 [math.AG])

Onderzoeksoutput: Boek/rapportRapportAcademic

1 Downloads (Pure)

The one-dimensional Euclidean domain : finitely many obstructions are not enough

Chen, J., Pruhs, K. R. & Woeginger, G. J., 2015, arXiv.org. 22 blz. (arXiv; vol. 1506.03838 [cs.GT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Tighter, faster, simpler side-channel security evaluations beyond computing power

Bernstein, D. J., Lange, T. & Vredendaal, van, C., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/221)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
204 Downloads (Pure)

Trinocchio : privacy-friendly outsourcing by distributed verifiable computation

Schoenmakers, B., Veeningen, M. G. & Vreede, de, N., 2015, s.n. 34 blz. (Cryptology ePrint Archive; vol. 2015/480)

Onderzoeksoutput: Boek/rapportRapportAcademic

Truncated modules and linear presentations of vector bundles

Boralevi, A., Faenzi, D. & Lella, P., 2015, s.n. 15 blz. (arXiv; vol. 1505.04204)

Onderzoeksoutput: Boek/rapportRapportAcademic

Universally verifiable multiparty computation from threshold homomorphic cryptosystems

Schoenmakers, B. & Veeningen, M. G., 2015, s.n. 32 blz. (Cryptology ePrint Archive; vol. 2015/058)

Onderzoeksoutput: Boek/rapportRapportAcademic

9 Citaten (Scopus)
1 Downloads (Pure)
2014

A branch and price procedure for the container premarshalling problem

Brink, van, M. & Zwaan, van der, G. R. J., 2014, s.n. 27 blz. (arXiv; vol. 1406.7107 [cs.DS])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
12 Citaten (Scopus)
66 Downloads (Pure)

Algebraic boundary of matrices of nonnegative rank at most three

Eggermont, R. H., Horobet, E. & Kubjas, K., 2014, s.n. 15 blz. (arXiv.org; vol. 1412.1654 [math.AG])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
71 Downloads (Pure)

A polynomial time attack against algebraic geometry code based public key cryptosystems

Couvreur, A., Márquez-Corbella, I. & Pellikaan, G. R., 2014, s.n. 11 blz. (arXiv.org; vol. 1401.6025 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
18 Citaten (Scopus)
107 Downloads (Pure)

Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders

Laarhoven, T. M. M., 2014, 14 blz. (arXiv.org; vol. 1404.2825 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
63 Downloads (Pure)

Asymptotics of fingerprinting and group testing: tight bounds from channel capacities

Laarhoven, T. M. M., 2014, 14 blz. (arXiv.org; vol. 1404.2576 [cs.IT])

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
62 Downloads (Pure)