Filter
Conferentiebijdrage

Zoekresultaten

  • 2024

    Batch Signatures, Revisited.

    Melchor, C. A., Albrecht, M. R., Bailleux, T., Bindel, N., Howe, J., Hülsing, A., Joseph, D. & Manzano, M., 2024, Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings. Oswald, E. (uitgave). blz. 163-186 24 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • 2023

    Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem

    Ran, L., Samardjiska, S. & Trimoska, M., 2023, Code-Based Cryptography - 11th International Workshop, CBCrypto 2023, Revised Selected Papers. Esser, A. & Santini, P. (uitgave). blz. 84-103 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14311 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
  • Concrete Analysis of Quantum Lattice Enumeration

    Bai, S., van Hoof, M. I., Johnson, F. B., Lange, T. & Ngo, T., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (uitgave). Springer, blz. 131-166 36 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14440 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
  • Disorientation Faults in CSIDH

    Banegas, G., Krämer, J., Lange, T., Meyer, M., Panny, L., Reijnders, K., Sotáková, J. & Trimoska, M., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (uitgave). Springer, blz. 310-342 33 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    1 Citaat (Scopus)
  • Duality and LP Bounds for Codes with Locality

    Gruica, A., Jany, B. & Ravagnani, A., 28 apr. 2023, 2023 IEEE Information Theory Workshop, ITW 2023. IEEE/LEOS, blz. 347-352 6 blz. 10161676

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Efficient Extended GCD and Class Groups from Secure Integer Arithmetic

    Schoenmakers, B. & Segers, T., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (uitgave). Springer, blz. 32-48 17 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    2 Citaten (Scopus)
  • Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform

    Hövelmanns, K., Hülsing, A. & Majenz, C., 2023, Advances in Cryptology -- ASIACRYPT 2022. Agrawal, S. & Lin, D. (uitgave). Cham: Springer Nature, blz. 414-443 30 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium

    Barbosa, M., Barthe, G., Doczkal, C., Don, J., Fehr, S., Grégoire, B., Huang, Y.-H., Hülsing, A., Lee, Y. & Wu, X., 2023, Advances in Cryptology – CRYPTO 2023 : 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (uitgave). Cham: Springer, Vol. 5. blz. 358-389 32 blz. (Lecture Notes in Computer Science; vol. 14085).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    3 Citaten (Scopus)
  • Machine-Checked Security for XMSS as in RFC 8391 and SPHINCS+

    Barbosa, M., Dupressoir, F., Grégoire, B., Hülsing, A., Meijers, M. & Strub, P.-Y., 2023, Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Handschuh, H. & Lysyanskaya, A. (uitgave). Cham: Springer, blz. 421-454 34 blz. (Lecture Notes in Computer Science; vol. 14085).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic

    Korzilius, S. & Schoenmakers, B., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (uitgave). Springer, blz. 307-319 13 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    1 Citaat (Scopus)
  • Practical key-recovery attack on MQ-Sign and more

    Aulbach, T., Samardjiska, S. & Trimoska, M., 2023, (Geaccepteerd/In druk) PQCrypto 2024.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Recovering the Tight Security Proof of SPHINCS+

    Hülsing, A. & Kudinov, M., jan. 2023, Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part IV. Agrawal, S. & Lin, D. (uitgave). Cham: Springer Nature, blz. 3-33 31 blz. (Lecture Notes in Computer Science (LNCS); vol. 13794).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    5 Citaten (Scopus)
  • SDitH in the QROM

    Melchor, C. A., Hülsing, A., Joseph, D., Majenz, C., Ronen, E. & Yue, D., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (uitgave). Cham, blz. 317-350 34 blz. (Lecture Notes in Computer Science (LNCS; vol. 14444).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
  • SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost.

    Hülsing, A., Kudinov, M., Ronen, E. & Yogev, E., 2023, Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023. Institute of Electrical and Electronics Engineers, blz. 1435-1453 19 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    2 Citaten (Scopus)
  • The Return of the SDitH

    Melchor, C. A., Gama, N., Howe, J., Hülsing, A., Joseph, D. & Yue, D., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (uitgave). blz. 564-596 33 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    7 Citaten (Scopus)
  • The Role of the Alphabet in Network Coding: An Optimization Approach

    Hojny, C., Kiliç, A. B. & Ravagnani, A., 2023, 2023 IEEE Information Theory Workshop, ITW 2023. Institute of Electrical and Electronics Engineers, blz. 526-531 6 blz. 10161662

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Towards Transparent Cheat Detection in Online Chess: An Application of Human and Computer Decision-Making Preferences

    Laarhoven, T. & Ponukumati, A., 2023, Computers and Games - International Conference, CG 2022, Revised Selected Papers. Browne, C., Kishimoto, A. & Schaeffer, J. (uitgave). Springer, blz. 163-180 18 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13865 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • 2022

    Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt.

    Hülsing, A., Meijers, M. & Strub, P.-Y., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (uitgave). blz. 622-653 32 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13507 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    2 Citaten (Scopus)
  • Isolation Schemes for Problems on Decomposable Graphs.

    Nederlof, J., Pilipczuk, M., Swennenhuis, C. M. F. & Wegrzycki, K., 1 mrt. 2022, 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022. Berenbrink, P. & Monmege, B. (uitgave). blz. 50:1-50:20 20 blz. 50. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 219).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    2 Citaten (Scopus)
  • Package Delivery Using Drones with Restricted Movement Areas

    Erlebach, T., Luo, K. & Spieksma, F. C. R., 1 dec. 2022, 33rd International Symposium on Algorithms and Computation, ISAAC 2022. Bae, S. W. & Park, H. (uitgave). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 49. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 248).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Post Quantum Noise.

    Angel, Y., Dowling, B., Hülsing, A., Schwabe, P. & Weber, F., 7 nov. 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. blz. 97-109 13 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    4 Citaten (Scopus)
  • 2021

    Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.

    Han, S., Jager, T., Kiltz, E., Liu, S., Pan, J., Riepel, D. & Schäge, S., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (uitgave). blz. 670-700 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    12 Citaten (Scopus)
  • Dual Lattice Attacks for Closest Vector Problems (with Preprocessing).

    Laarhoven, T. & Walter, M., 2021, Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings. Paterson, K. G. (uitgave). blz. 478-502 25 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12704 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    1 Citaat (Scopus)
  • Efficient Secure Ridge Regression from Randomized Gaussian Elimination

    Blom, F., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (uitgave). Springer, blz. 301-316 16 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    3 Citaten (Scopus)
  • Epochal Signatures for Deniable Group Chats

    Hülsing, A. & Weber, F., 1 mei 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, blz. 1677-1695 19 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    1 Citaat (Scopus)
  • Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing

    Duman, J., Hövelmanns, K., Kiltz, E., Lyubashevsky, V. & Seiler, G., 12 nov. 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, blz. 2722-2737 16 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    10 Citaten (Scopus)
  • Improving Schroeppel and Shamir's algorithm for subset sum via orthogonal vectors

    Nederlof, J. & Wegrzycki, K., 15 jun. 2021, STOC 2021 - Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing. Khuller, S. & Williams, V. V. (uitgave). blz. 1670-1683 14 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    9 Citaten (Scopus)
  • Lower Bounds on Lattice Sieving and Information Set Decoding.

    Kirshanova, E. & Laarhoven, T., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (uitgave). Springer, blz. 791-820 30 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    1 Citaat (Scopus)
  • On the Impossibility of Purely Algebraic Signatures.

    Döttling, N., Hartmann, D., Hofheinz, D., Kiltz, E., Schäge, S. & Ursu, B., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (uitgave). blz. 317-349 33 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    5 Citaten (Scopus)
  • Post-Quantum WireGuard

    Hülsing, A., Ning, K., Schwabe, P., Weber, F. & Zimmermann, P. R., 1 mei 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, blz. 304-321 18 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    25 Citaten (Scopus)
  • The Typical Non-Linear Code over Large Alphabets

    Gruica, A. & Ravagnani, A., 2021, 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings. Institute of Electrical and Electronics Engineers

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    1 Citaat (Scopus)
  • Tight Adaptive Reprogramming in the QROM

    Grilo, A. B., Hövelmanns, K., Hülsing, A. & Majenz, C., 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings. Tibouchi, M. & Wang, H. (uitgave). Cham: Springer, Vol. 1. blz. 637-667 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13090 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    7 Citaten (Scopus)
  • Tightly-Secure Authenticated Key Exchange, Revisited.

    Jager, T., Kiltz, E., Riepel, D. & Schäge, S., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (uitgave). blz. 117-146 30 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12696 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    7 Citaten (Scopus)
  • Verifying Post-Quantum Signatures in 8 kB of RAM.

    Gonzalez, R., Hülsing, A., Kannwischer, M. J., Krämer, J., Lange, T., Stöttinger, M., Waitz, E., Wiggers, T. & Yang, B.-Y., 2021, Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Proceedings. Cheon, J. H. & Tillich, J.-P. (uitgave). blz. 215-233 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    6 Citaten (Scopus)
  • 2020

    Approximation Algorithms for Car-Sharing Problems

    Luo, K. & Spieksma, F. C. R., 2020, Computing and Combinatorics - 26th International Conference, COCOON 2020, Proceedings. Kim, D., Uma, R. N., Cai, Z. & Lee, D. H. (uitgave). Springer, blz. 262-273 12 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12273 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    5 Citaten (Scopus)
  • A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals

    Bouman, N. J. & de Vreede, N., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (uitgave). Springer, blz. 398-417 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Detecting feedback vertex sets of size K in O*(2.7k) time

    Li, J. & Nederlof, J., 2020, 31st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2020. Chawla, S. (uitgave). Association for Computing Machinery, Inc, blz. 971-989 19 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Generalized Matsui Algorithm 1 with Application for the Full DES

    Ashur, T., Posteuca, R., Šijačić, D. & D’haeseleer, S., 2020, Security and Cryptography for Networks. SCN 2020. Galdi, C. & Kolesnikov, V. (uitgave). Springer, blz. 448-467 20 blz. (Lecture notes in computer science; vol. 12238)(Security and Cryptology; vol. 12238).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    Bestand
    1 Citaat (Scopus)
    46 Downloads (Pure)
  • Generic Authenticated Key Exchange in the Quantum Random Oracle Model.

    Hövelmanns, K., Kiltz, E., Schäge, S. & Unruh, D., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (uitgave). blz. 389-422 34 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    23 Citaten (Scopus)
  • Hamiltonian Cycle Parameterized by Treedepth in Single Exponential Time and Polynomial Space

    Nederlof, J., Pilipczuk, M., Swennenhuis, C. M. F. & Wegrzycki, K., 2020, Graph-Theoretic Concepts in Computer Science: 46th International Workshop, WG 2020, Leeds, UK, June 24–26, 2020, Revised Selected Papers. Adler, I. & Müller, H. (uitgave). Springer, blz. 27-39 13 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12301 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    13 Citaten (Scopus)
  • McTiny: Fast high-confidence post-quantum key erasure for tiny network servers

    Bernstein, D. J. & Lange, T., 2020, Proceedings of the 29th USENIX Security Symposium. Usenix Association, blz. 1731-1748 18 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    2 Citaten (Scopus)
  • Online vector balancing and geometric discrepancy

    Bansal, N., Jiang, H., Singla, S. & Sinha, M., 8 jun. 2020, STOC 2020 - Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing. Makarychev, K., Makarychev, Y., Tulsiani, M., Kamath, G. & Chuzhoy, J. (uitgave). Association for Computing Machinery, Inc, blz. 1139-1152 14 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    15 Citaten (Scopus)
  • On the Fine-Grained Parameterized Complexity of Partial Scheduling to Minimize the Makespan.

    Nederlof, J. & Swennenhuis, C. M. F., dec. 2020, 15th International Symposium on Parameterized and Exact Computation (IPEC 2020). Cao, Y. & Pilipczuk, M. (uitgave). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 25:1-25:17 25. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 180).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Polytopes, lattices, and spherical codes for the nearest neighbor problem

    Laarhoven, T., 1 jun. 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (uitgave). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 76:1-76:14 14 blz. 76. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • Prelude to Marvellous: With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy

    Ashur, T. & Dhooghe, S., aug. 2020, The Conference for Failed Approaches and Insightful Losses in Cryptology: CFail 2020. 26 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    Bestand
    42 Downloads (Pure)
  • Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.

    Schäge, S., Schwenk, J. & Lauer, S., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (uitgave). blz. 567-596 30 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    3 Citaten (Scopus)
  • Rational Isogenies from Irrational Endomorphisms

    Castryck, W., Panny, L. & Vercauteren, F., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (uitgave). Springer, blz. 523-548 26 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    13 Citaten (Scopus)
  • Rotational Cryptanalysis on MAC Algorithm Chaskey

    Kraleva, L., Ashur, T. & Rijmen, V., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings: ACNS 2020. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (uitgave). Springer, blz. 153-168 16 blz. (Lecture Notes in Computer Science ; vol. 12146).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    Bestand
    4 Citaten (Scopus)
    35 Downloads (Pure)
  • Rotational-XOR Cryptanalysis of Simon-like Block Ciphers

    Lu, J., Liu, Y., Ashur, T., Sun, B. & Li, C., 2020, Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Proceedings. Liu, J. K. & Cui, H. (uitgave). Springer, Vol. 12248. blz. 105-124 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12248 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    Bestand
    13 Citaten (Scopus)
    71 Downloads (Pure)
  • Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPP.

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2020, Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Nitaj, A. & Youssef, A. (uitgave). Springer, blz. 301-320 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    2 Citaten (Scopus)