Zoekresultaten

  • 2018

    XMSS: extended hash-based signatures. RFC 8391

    Hülsing, A. T., Butin, D., Gazdag, S.-L., Rijneveld, J. & Mohaisen, A., 2018

    Onderzoeksoutput: Andere bijdrageOverige bijdrageProfessioneel

    Open Access
  • “Oops, I did it again” – Security of one-time signatures under two-message attacks

    Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams , C. & Camenisch, J. (uitgave). Cham: Springer, blz. 299-322 24 blz. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    11 Citaten (Scopus)
  • 2017

    High-speed key encapsulation from NTRU

    Hülsing, A., Rijneveld, J., Schanck, J. & Schwabe, P., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings. Springer, blz. 232-252 21 blz. (Lecture Notes in Computer Science; vol. 10529).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    52 Citaten (Scopus)
  • MQDSS - Submission to the NIST post-quantum cryptography project

    Chen, M.-S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2017

    Onderzoeksoutput: Andere bijdrageOverige bijdrageAcademic

    Open Access
  • NTRU-HRSS-KEM - Submission to the NIST post-quantum cryptography project

    Hülsing, A., Rijneveld, J., Schanck, J. M. & Schwabe, P., 2017

    Onderzoeksoutput: Andere bijdrageOverige bijdrageAcademic

    Open Access
  • Post-quantum security of the sponge construction

    Czajkowski, J., Groot Bruinderink, L., Hülsing, A. T., Schaffner, C. & Unruh, D., 2017, blz. 1-32.

    Onderzoeksoutput: Bijdrage aan congresPaperAcademic

  • Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

    Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 blz. (Cryptology ePrint Archive; vol. 2017/1025)

    Onderzoeksoutput: Boek/rapportRapportAcademic

    Open Access
    Bestand
    108 Downloads (Pure)
  • SPHINCS+ - Submission to the NIST post-quantum cryptography project

    Bernstein, D. J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S.-L., Hülsing, A., Kampanakis, P., Kölbl, S., Lange, T., Lauridsen, M. M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J. & Schwabe, P., 2017

    Onderzoeksoutput: Andere bijdrageOverige bijdrageAcademic

    Open Access
  • 2016

    ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I. Cheng, C.-M., Chung, K.-M., Persiano, G. & Yang, B.-Y. (uitgave). Berlin: Springer, blz. 446-470 25 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    35 Citaten (Scopus)
  • Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

    Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 blz. (Cryptology ePrint Archive ; vol. 2016/300)

    Onderzoeksoutput: Boek/rapportRapportAcademic

    Open Access
    Bestand
    327 Downloads (Pure)
  • Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

    Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (uitgave). Springer, Vol. 9813. blz. 323-345 23 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    135 Citaten (Scopus)
  • From 5-pass MQ-based identification to MQ-based signatures

    Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, blz. 135-165 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 ).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    54 Citaten (Scopus)
  • Mitigating multi-target attacks in hash-based signatures

    Hülsing, A. T., Rijneveld, J. & Song, F., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I. Cheng, C.-M., Chung, K.-M., Persiano, G. & Yang, B.-Y. (uitgave). Springer, Vol. 9614. blz. 387-416 30 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    74 Citaten (Scopus)
  • Semantic security and indistinguishability in the quantum world

    Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Robshaw, M. & Katz, J. (uitgave). Dordrecht: Springer, blz. 60-89 30 blz. (Lecture Notes in Computer Science; vol. 9816).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    37 Citaten (Scopus)
    1 Downloads (Pure)
  • 2015

    ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2015, s.l.: IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/1042)

    Onderzoeksoutput: Boek/rapportRapportAcademic

  • Bad directions in cryptographic hash functions

    Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (uitgave). Berlin: Springer, blz. 488-508 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    2 Citaten (Scopus)
  • Bad directions in cryptographic hash functions

    Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 blz. (Cryptology ePrint Archive; vol. 2015/151)

    Onderzoeksoutput: Boek/rapportRapportAcademic

    Open Access
    Bestand
    306 Downloads (Pure)
  • How to manipulate curve standards: a white paper for the black hat

    Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (uitgave). Berlin: Springer, blz. 109-139 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    12 Citaten (Scopus)
    3 Downloads (Pure)
  • PALPAS ± PAsswordLess PAssword Synchronization

    Horsch, M., Hülsing, A. T. & Buchmann, J., 2015, s.n. 11 blz. (arXiv; vol. 1506.04549 [cs.CR])

    Onderzoeksoutput: Boek/rapportRapportAcademic

  • PALPAS - PAssword Less PAssword synchronization

    Horsch, M., Hülsing, A. T. & Buchmann, J., 16 okt. 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway: Institute of Electrical and Electronics Engineers, blz. 30-39 10 blz. 7299896

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    7 Citaten (Scopus)
  • Semantic security and indistinguishability in the quantum world

    Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2015, s.n. 32 blz. (arXiv; vol. 1504.05255 [cs.CR])

    Onderzoeksoutput: Boek/rapportRapportAcademic

    Open Access
    Bestand
    179 Downloads (Pure)
  • SPHINCS : practical stateless hash-based signatures

    Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (uitgave). Berlin: Springer, blz. 368-397 (Lecture Notes in Computer Science; vol. 9056).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    221 Citaten (Scopus)
  • 2014

    Developing and testing SCoP : a visual hash scheme

    Maina Olembo, M., Kilian, T., Stockhardt, S., Hülsing, A. & Volkamer, M., 7 okt. 2014, In: Information Management and Computer Security. 22, 4, blz. 382-392 11 blz.

    Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

  • Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers

    Buchmann, J., Cabarcas, D., Göpfert, F., Hülsing, A. T. & Weiden, P., 2014, Selected Areas in Cryptography - SAC 2013 (20th International Conference, Burnaby BC, Canada, August 14-16, 2013. Revised Selected Papers). Lange, T., Lauter, K. & Lisonek, P. (uitgave). Berlin: Springer, blz. 402-417 (Lecture Notes in Computer Science; vol. 8282).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    43 Citaten (Scopus)
    1 Downloads (Pure)
  • How to manipulate curve standards : a white paper for the black hat

    Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 blz. (Cryptology ePrint Archive; vol. 2014/571)

    Onderzoeksoutput: Boek/rapportRapportAcademic

    Open Access
    3 Downloads (Pure)
  • Revocation and non-repudiation : when the first destroys the latter

    Braun, J., Kiefer, F. & Hülsing, A. T., 2014, Public Key Infrastructures, Services and Applications (10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers). Katsikas, S. & Agudo, I. (uitgave). Berlin: Springer, blz. 31-46 (Lecture Notes in Computer Science; vol. 8341).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    2 Citaten (Scopus)
    1 Downloads (Pure)
  • SPHINCS: practical stateless hash-based signatures

    Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 blz. (Cryptology ePrint Archive; vol. 2014/795)

    Onderzoeksoutput: Boek/rapportRapportAcademic

    Open Access
  • 2013

    Developing and testing a visual hash scheme

    Olembo, M. M., Kilian, T., Stockhardt, S., Hülsing, A. & Volkamer, M., 2013, Proceedings of the European Information Security Multi-Conference, EISMC 2013, 8-10 may 2013, Portugal, Lisbon. Plymouth University, Centre for Security, Communications & Network Research, blz. 91-100 10 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    2 Citaten (Scopus)
  • Forward secure signatures on smart cards preliminary version

    Hülsing, A., Busold, C. & Buchmann, J., 2013, Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Knudsen , L. R. & Wu, H. (uitgave). Berlin: Springer, blz. 66-80 15 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7707 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    22 Citaten (Scopus)
  • How to avoid the breakdown of public key infrastructures: forward secure signatures for certificate authorities

    Braun, J., Hülsing, A., Wiesmaier, A., Vigil, M. A. G. & Buchmann, J., 2013, Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. De Capitani di Vimercati , S. & Mitchell, C. (uitgave). Berlin: Springer, blz. 53-68 16 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7868 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    2 Citaten (Scopus)
  • Instantiating Treeless Signature Schemes

    Weiden, P., Hülsing, A., Cabarcas, D. & Buchmann, J., 2013, In: IACR Cryptology ePrint Archive. 2013, blz. 65 1 blz.

    Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademic

  • On the security of the Winternitz one-time signature scheme

    Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2013, In: International Journal of Applied Cryptography. 3, 1, blz. 84-96 13 blz.

    Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

    13 Citaten (Scopus)
  • Optimal parameters for XMSSMT

    Hülsing, A. T., Rausch, L. & Buchmann, J., 2013, Security engineering and intelligence informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Berlin: Springer, blz. 194-208 15 blz. (Lecture Notes in Computer Science; vol. 8128).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    55 Citaten (Scopus)
  • W-OTS+ - shorter signatures for hash-based signature schemes

    Hülsing, A. T., 2013, Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Youssef, A., Nitaj, A. & Hassanien, A. E. (uitgave). Berlin: Springer, blz. 173-188 16 blz. (Lecture Notes in Computer Science (LNCS); vol. 7918).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    115 Citaten (Scopus)
  • 2011

    On the security of the Winternitz one-time signature scheme

    Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2011, Progress in Cryptology – AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 Proceedings. Nitaj, A. & Pointcheval, D. (uitgave). Berlin: Springer, blz. 363-378 16 blz. (Lecture Notes in Computer Science; vol. 6737).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    71 Citaten (Scopus)
  • XMSS : a practical forward secure signature scheme based on minimal security assumptions

    Buchmann, J., Dahmen, E. & Hülsing, A., 2011, Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings. Yang, B.-Y. (uitgave). Berlin: Springer, blz. 117-129 13 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    191 Citaten (Scopus)
    1 Downloads (Pure)
  • 2007

    Security of invertible media authentication schemes revisited

    Dönigus, D., Endler, S., Fischlin, M., Hülsing, A. T., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding : 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. & Bas, P. (uitgave). Berlin: Springer, blz. 189-203 15 blz. (Lecture Notes in Computer Science (LNCS); vol. 4567).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review