• Postbus 513, MF

    5600MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Conferentiebijdrage
2018

The dominating set problem in geometric intersection graphs

De Berg, M., Kisfaludi-Bak, S. & Woeginger, G., 1 feb 2018, 12th International Symposium on Parameterized and Exact Computation, IPEC 2017. Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 14:1-14:12 (LIPIcs; vol. 89).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
1 Citaat (Scopus)
28 Downloads (Pure)

The gram-Schmidt walk: a cure for the banaszczyk blues

Bansal, N., Garg, S., Dadush, D. & Lovett, S., 20 jun 2018, STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. Association for Computing Machinery, Inc, blz. 1269-1282 14 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

Towards secure name resolution on the internet

Grothoff, C., Wachs, M., Ermert, M. & Appelbaum, J., 2018, NDSS 2017 DNS Privacy Workshop DPRIV17 '17. blz. 1-20

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

“Oops, I did it again” – Security of one-time signatures under two-message attacks

Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Cham: Springer, blz. 299-322 24 blz. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
2017

A hybrid lattice basis reduction and quantum search attack on LWE

Göpfert, F., van Vredendaal, C. & Wunderer, T., 2017, Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Dordrecht: Springer, blz. 184-202 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

Algorithmic discrepancy beyond partial coloring

Bansal, N. & Garg, S., 19 jun 2017, STOC 2017 Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 19-23 June 2017, Montreal, Canada. New York: Association for Computing Machinery, Inc, blz. 914-926 13 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

13 Citaten (Scopus)

A low-resource quantum factoring algorithm

Bernstein, D. J., Biasse, J. F. & Mosca, M., 2017, Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lange, T. & Takagi, T. (redactie). Dordrecht: Springer, blz. 330-346 17 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

Balanced optimization with vector costs

Ficker, A. M. C., Spieksma, F. C. R. & Woeginger, G. J., 2017, Approximation and Online Algorithms : 14th International Workshop, WAOA 2016, Revised Selected Papers. Jansen, K. & Mastrolilli, M. (redactie). Cham: Springer, blz. 92-102 11 blz. (Lecture Notes in Computer Science ; vol. 10138).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Binary puzzle as a SAT problem

Utomo, P. H. & Pellikaan, G. R., 11 mei 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Faster space-efficient algorithms for subset sum and k-sum

Bansal, N., Garg, S., Nederlof, J. & Vyas, N., 19 jun 2017, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. McKenzie, P., King, V. & Hatami, H. (redactie). New York: Association for Computing Machinery, Inc, blz. 198-209 12 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

8 Citaten (Scopus)

Foundational (co)datatypes and (co)recursion for higher-order logic

Biendarra, J., Blanchette, J. C., Bouzy, A., Desharnais, M., Fleury, M., Hölzl, J., Kunčar, O., Lochbihler, A., Meier, F., Panny, L., Popescu, A., Sternagel, C., Thiemann, R. & Traytel, D., 1 jan 2017, Frontiers of Combining Systems - 11th International Symposium, FroCoS 2017, Proceedings. Dixon, C. & Finger, M. (redactie). Dordrecht: Springer, blz. 3-21 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10483 LNAI).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

Fully-dynamic and kinetic conflict-free coloring of intervals with respect to points

de Berg, M. T., Leijsen, T., Markovic, A., van Renssen, A. M., Roeloffzen, M. J. M. & Woeginger, G., 1 dec 2017, ISAAC 2017 : 28th International Symposium on Algorithms and Computation, 9-12 December 2017, Phuket, Thailand . Tokuyama, T. & Okamoto, Y. (redactie). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 26:1-26:13 (Leibniz International Proceedings in Informatics, LIPIcs; vol. 92).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

High-speed key encapsulation from NTRU

Hülsing, A., Rijneveld, J., Schanck, J. & Schwabe, P., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings. Springer, blz. 232-252 21 blz. (Lecture Notes in Computer Science; vol. 10529).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

LAST but not least: online spanners for buy-at-bulk

Gupta, A., Ravi, R., Talwar, K. & Umboh, S. W., 2017, Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. Klein, P. N. (redactie). Society for Industrial and Applied Mathematics (SIAM), blz. 589-599 11 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
3 Citaten (Scopus)
52 Downloads (Pure)

Lattice klepto: Turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Dordrecht: Springer, blz. 336-354 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Low-communication parallel quantum multi-target preimage search

Banegas, G. S. & Bernstein, D. J., 23 dec 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised selected papers. Adams, C. & Camenisch, J. (redactie). Dordrecht: Springer, blz. 325-335 11 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)
1 Downloads (Pure)

LP-based robust algorithms for noisy minor-free and bounded treewidth graphs

Bansal, N., Reichman, D. & Umboh, S. W., 2017, Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. Klein, P. N. (redactie). Society for Industrial and Applied Mathematics (SIAM), blz. 1964-1979 16 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
7 Citaten (Scopus)

NTRU prime: reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Berlin: Springer, blz. 235-260 26 blz. (Lecture Notes in Computer Science; vol. 10719).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

14 Citaten (Scopus)

Optimal hashing-based time-space trade-offs for approximate near neighbors

Andoni, A., Laarhoven, T., Razenshteyn, I. & Waingarten, E., 4 jan 2017, 28th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017. Klein, P. N. (redactie). s.l.: Society for Industrial and Applied Mathematics (SIAM), blz. 47-66 20 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
35 Citaten (Scopus)

Post-quantum rsa

Bernstein, D. J., Heninger, N., Lou, P. & Valenta, L., 2017, Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lange, T. & Takagi, T. (redactie). Dordrecht: Springer, blz. 311-329 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

Short generators without quantum computers: the case of multiquadratics

Bauch, J., Bernstein, D. J., de Valence, H., Lange, T. & van Vredendaal, C., 2017, Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. Coron, J-S. & Nielsen, J. B. (redactie). Dordrecht: Springer, blz. 27-59 33 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10210 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

Sliding right into disaster : left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Homma, N. & Fischer, W. (redactie). Dordrecht: Springer, blz. 555-576 22 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10529 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

13 Citaten (Scopus)

The (h,k)-server problem on bounded-depth trees.

Bansal, N., Elias, M., Jez, L. & Koumoutsos, G., 2017, Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 16-19 January 2017, Barcelona, Spain. Klein, P. N. (redactie). s.l.: Society for Industrial and Applied Mathematics (SIAM), blz. 1022-1037 16 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
6 Citaten (Scopus)
56 Downloads (Pure)

The subset sum game revisited

Pieterse, A. & Woeginger, G. J., 2017, Algorithmic Decision Theory: 5th International Conference, ADT 2017, Luxembourg, Luxembourg, October 25–27, 2017, Proceedings. Rothe, J. (redactie). Dordrecht: Springer, blz. 228-240 13 blz. (Lecture Notes in Computer Science; vol. 10576).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

To BLISS-B or not to be : attacking strong Swan's implementation of post-quantum signatures

Pessl, P., Groot Bruinderink, L. & Yarom, Y., 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Thuraisingham, B. M., Evans, D., Malkin, T. & Xu, D. (redactie). New York: Association for Computing Machinery, Inc, blz. 1843-1855 13 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
18 Citaten (Scopus)
82 Downloads (Pure)

Weighted k-server bounds via combinatorial dichotomies

Bansal, N., Elias, M. & Koumoutsos, G., 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), 15-17 October 2017, Berkeley, California. Piscataway: Institute of Electrical and Electronics Engineers, blz. 493-504 12 blz. 8104084

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)
2016

An algorithm for komlos conjecture matching Banaszczyk's bound

Bansal, N., Dadush, D. & Garg, S., 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 9-11 October 2016, New Brunswick, New Jersey . Piscataway: Institute of Electrical and Electronics Engineers, blz. 788-799

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

20 Citaten (Scopus)

Approximation-friendly discrepancy rounding

Bansal, N. & Nagarajan, V., 2016, Integer Programming and Combinatorial Optimization: 18th International Conference, IPCO 2016, Liège, Belgium, June 1-3, 2016, Proceedings. Louveaux, Q. & Skutella, M. (redactie). Dordrecht: Springer, blz. 375-386 (Lecture Notes in Computer Science; vol. 9682).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)

ARMed SPHINCS computing a 41KB signature in 16KB of RAM

Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (redactie). Berlin: Springer, blz. 446-470 25 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

Colouring contact graphs of squares and rectilinear polygons

de Berg, M., Markovic, A. & Woeginger, G., 2016, 32nd European Workshop on Computational Geometry (EuroCG 2016), 30 March - 1 April, Lugano, Switzerland. blz. 71-74 4 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Open Access
Bestand
17 Downloads (Pure)

Creating cryptographic challenges using multi-party computation : the LWE challenge

Buchmann, J., Buscher, N., Göpfert, F., Katzenbeisser, S., Kramer, J., Micciancio, D., Siim, S., van Vredendaal, C. & Walter, M., 2016, AsiaPKC '16 Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 30 May 2016, Xi'an, China. New York: Association for Computing Machinery, Inc, blz. 11-20

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)

Dense subset sum may be the hardest

Austrin, P., Kaski, P., Koivisto, M. & Nederlof, J., 2016, 33rd Symposium on Theoretical Aspects of Computer Science, STACS 2016, February 17-20, 2016, Orléans, France. Ollinger, N. & Vollmer, H. (redactie). s.l.: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 13:1-13:14

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

Efficient (Ideal) lattice sieving using cross-polytope LSH

Becker, A. & Laarhoven, T., 1 jan 2016, Progress in Cryptology – AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. Pointcheval, D., Nitaj, A. & Rachidi, T. (redactie). Dordrecht: Springer, blz. 3-23 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)

Exponential time paradigms through the polynomial time lens

Drucker, A., Nederlof, J. & Santhanam, R., 2016, 24th Annual European Symposium on Algorithms, ESA 2016, August 22-24, 2016, Aarhus, Denmark. Sankowski, P. & Zaroliagis, C. (redactie). s.l.: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 36:1-36:14

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Finding large set covers faster via the representation method

Nederlof, J., 2016, 24th Annual European Symposium on Algorithms, ESA 2016, August 22-24, 2016, Aarhus, Denmark. Sankowski, P. & Zaroliagis, C. (redactie). s.l.: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 69:1-69:15

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Fine-grained complexity analysis of two classic TSP variants

de Berg, M. T., Buchin, K. A., Jansen, B. M. P. & Woeginger, G. J., 2016, 43rd International Colloquium on Automata, Languages and Programming (ICALP 2016), 11-15 July 2016, Rome, Italy. blz. 1-14 5

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

14 Citaten (Scopus)
3 Downloads (Pure)

Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (redactie). Springer, Vol. 9813. blz. 323-345 23 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

58 Citaten (Scopus)

From 5-pass MQ-based identification to MQ-based signatures

Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, blz. 135-165 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 ).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

22 Citaten (Scopus)

Improved approximation for vector bin packing

Bansal, N., Elias, M. & Khan, A., 2016, Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 10-12 January 2016, Arlington, Virginia. s.l.: Society for Industrial and Applied Mathematics (SIAM), blz. 1561-1579 19 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
10 Citaten (Scopus)
67 Downloads (Pure)

Lift-and-round to improve weighted completion time on unrelated machines

Bansal, N., Srinivasan, A. & Svensson, O., 19 jun 2016, STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. Cambridge, Ma: Association for Computing Machinery, Inc, blz. 156-167 12 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

14 Citaten (Scopus)

Mitigating multi-target attacks in hash-based signatures

Hülsing, A. T., Rijneveld, J. & Song, F., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (redactie). Springer, Vol. 9614. blz. 387-416 30 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

39 Citaten (Scopus)

New directions in nearest neighbor searching with applications to lattice sieving

Becker, A., Ducas, L., Gama, N. & Laarhoven, T., 1 jan 2016, 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016. New York: Association for Computing Machinery, Inc, blz. 10-24 15 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

77 Citaten (Scopus)

QcBits: constant-time small-key code-based cryptography

Chou, T., 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Dordrecht: Springer, blz. 280-300 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

17 Citaten (Scopus)

Sandy2X: new curve25519 speed records

Chou, T., 2016, Selected Areas in Cryptography – SAC 2015: 22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papers. Dordrecht: Springer, blz. 145-160 16 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9566).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

8 Citaten (Scopus)

Semantic security and indistinguishability in the quantum world

Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Robshaw, M. & Katz, J. (redactie). Dordrecht: Springer, blz. 60-89 30 blz. (Lecture Notes in Computer Science; vol. 9816).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)

Sharper upper bounds for unbalanced Uniquely Decodable Code Pairs

Austrin, P., Kaski, P., Koivisto, M. & Nederlof, J., 2016, IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016. Piscataway: Institute of Electrical and Electronics Engineers, blz. 335-339 5 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Sieving for closest lattice vectors (with preprocessing)

Laarhoven, T., 16 jul 2016, Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Avanzi, R. & Heys, H. (redactie). Dordrecht: Springer, blz. 533-542 (LNCS; vol. 10532).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
5 Citaten (Scopus)
33 Downloads (Pure)

Subexponential time algorithms for embedding H-Minor free graphs

Bodlaender, H. L., Nederlof, J. & van der Zanden, T. C., 2016, 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016), 12-15 July 2016, Rome, Italy. Chatzigiannakis, I., Mitzenmacher, M., Rabani, Y. & Sangiorgi, D. (redactie). Dagstuhl, Germany: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 9:1-9:14 14 blz. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 55).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
10 Citaten (Scopus)
43 Downloads (Pure)

Towards a constructive version of Banaszczyk's vector balancing theorem

Dadush, D., Garg, S., Lovett, S. & Nikolov, A., 1 sep 2016, Approximation, randomization, and combinatorial optimization: algorithms and Techniques - 19th International Workshop, APPROX 2016 and 20th International Workshop, RANDOM 2016. Jansen, K., Mathieu, C., Rolim, J. D. P. & Umans, C. (redactie). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 12 blz. 28. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 60).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
4 Citaten (Scopus)
12 Downloads (Pure)

Trinocchio: privacy-preserving outsourcing by distributed verifiable computation

Schoenmakers, B., Veeningen, M. & De Vreede, N., 2016, Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Manulis, M., Sadeghi, A-R. & Schneider, S. (redactie). Dordrecht: Springer, blz. 346-366 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)