Als u wijzigingen in Pure hebt gemaakt, zullen deze hier binnenkort zichtbaar zijn.

Onderzoeksoutput

2019

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (redactie). Cham: Springer, blz. 409-441 33 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
10 Citaten (Scopus)
66 Downloads (Pure)
2018

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (redactie). Berlin: Springer, blz. 395-427 33 blz. (Lecture Notes in Computer Science; vol. 11274).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

30 Citaten (Scopus)

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 blz. (Cryptology ePrint Archive; vol. 2018/383)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
49 Downloads (Pure)

HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (redactie). Dordrecht: Springer, blz. 203-216 14 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
6 Citaten (Scopus)
2 Downloads (Pure)

Preface: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings

Lange, T. & Steinwandt, R., 1 jan 2018, Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lange, T. & Steinwandt, R. (redactie). Cham: Springer, blz. VI (Lecture Notes in Computer Science; vol. 10786).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureVoorwoord / nawoordAcademic

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 2018, IACR. 56 blz. (Cryptology ePrint Archive; vol. 2018/1059)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
56 Downloads (Pure)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (redactie). Berlin: Springer, blz. 728-757 30 blz. (Lecture Notes in Computer Science; vol. 10769).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)
2017

Classic McEliece

Bernstein, D. J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Schwabe, P., Sendrier, N., Szefer, J. & Wang, W., 2017

Onderzoeksoutput: Andere bijdrageOverige bijdrageAcademic

Open Access

Double-base scalar multiplication revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2017, s.l.: IACR. 38 blz. (Cryptology ePrint Archive; vol. 2017/037)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
38 Downloads (Pure)

"HILA5 pindakaas" : on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L. S., 2017, s.l.: IACR. 14 blz. (Cryptology ePrint Archive; vol. 2017/1214)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
118 Downloads (Pure)

Lattice klepto: Turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Dordrecht: Springer, blz. 336-354 19 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Lattice klepto : turning post-quantum crypto against itself

Kwant, R., Lange, T. & Thissen, K., 2017, s.l.: IACR. 19 blz. (Cryptology ePrint Archive ; vol. 2017/1140)

Onderzoeksoutput: Boek/rapportRapportAcademic

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 43 blz. (Cryptology ePrint Archive; vol. 2017/293)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
79 Downloads (Pure)

Montgomery curves and the Montgomery ladder

Bernstein, D. J. & Lange, T., 2017, Topics in Computational Number Theory Inspired by Peter L. Montgomery. Bos, J. W. . & Lenstra, A. K. (redactie). Cambridge: Cambridge University Press, blz. 82-115

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukAcademicpeer review

Open Access
Bestand
156 Downloads (Pure)

NTRU Prime

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Vredendaal, C. V., 2017

Onderzoeksoutput: Andere bijdrageOverige bijdrageAcademic

NTRU prime: reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (redactie). Berlin: Springer, blz. 235-260 26 blz. (Lecture Notes in Computer Science; vol. 10719).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

17 Citaten (Scopus)

NTRU prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2017.

Onderzoeksoutput: Bijdrage aan congresPaperAcademic

Open Access
Bestand
122 Downloads (Pure)

Post-quantum cryptography

Bernstein, D. J. & Lange, T., 14 sep 2017, In : Nature. 549, 7671, blz. 188-194 7 blz.

Onderzoeksoutput: Bijdrage aan tijdschriftArtikel recenserenAcademicpeer review

Bestand
37 Citaten (Scopus)
162 Downloads (Pure)

Post-quantum cryptography : dealing with the fallout of physics success

Bernstein, D. J. & Lange, T., 2017, s.l.: IACR. 20 blz. (Cryptology ePrint Archive; vol. 2017/314)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
238 Downloads (Pure)

Preface

Lange, T. & Takagi, T., 2017, Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lange, T. & Takagi, T. (redactie). Dordrecht: Springer, blz. VI (LNCS; vol. 10346).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureVoorwoord / nawoordAcademic

Open Access
Bestand
13 Downloads (Pure)

Rounded Gaussians : fast and secure constant-time sampling for lattice-based crypto

Hülsing, A. T., Lange, T. & Smeets, K., 2017, s.l.: IACR. 38 blz. (Cryptology ePrint Archive; vol. 2017/1025)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
70 Downloads (Pure)

Short generators without quantum computers: the case of multiquadratics

Bauch, J., Bernstein, D. J., de Valence, H., Lange, T. & van Vredendaal, C., 2017, Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. Coron, J-S. & Nielsen, J. B. (redactie). Dordrecht: Springer, blz. 27-59 33 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10210 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

Sliding right into disaster: left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, s.l.: IACR. 21 blz. (Cryptology ePrint Archive; vol. 2017/627)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
74 Downloads (Pure)

Sliding right into disaster : left-to-right sliding windows leak

Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Homma, N. & Fischer, W. (redactie). Dordrecht: Springer, blz. 555-576 22 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10529 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

16 Citaten (Scopus)

SPHINCS+ - Submission to the NIST post-quantum cryptography project

Bernstein, D. J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S-L., Hülsing, A., Kampanakis, P., Kölbl, S., Lange, T., Lauridsen, M. M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J. & Schwabe, P., 2017

Onderzoeksoutput: Andere bijdrageOverige bijdrageAcademic

Open Access
2016

(In-)Secure messaging with the Silent Circle instant messaging protocol

Verschoor, S. R. & Lange, T., 2016, s.l.: IACR. 19 blz. (Cryptology ePrint Archive; vol. 2016/703)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
17 Downloads (Pure)

Dual EC: a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R., 2016, The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. Y. A., Naccache, D. & Quisquater, J. J. (redactie). Dordrecht: Springer, blz. 256-281 26 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9100).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukAcademicpeer review

17 Citaten (Scopus)

Faster discrete logarithms on FPGAs

Bernstein, D. J., Engels, S., Lange, T., Niederhagen, R., Paar, C., Schwabe, P. & Zimmermann, R., 2016, s.l.: IACR. 16 blz. (Cryptology ePrint Archive; vol. 2016/382)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
74 Downloads (Pure)

Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme

Groot Bruinderink, L., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, s.l.: IACR. 31 blz. (Cryptology ePrint Archive ; vol. 2016/300)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
173 Downloads (Pure)

Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (redactie). Springer, Vol. 9813. blz. 323-345 23 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

63 Citaten (Scopus)

NTRU Prime : reducing attack surface at low cost

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & van Vredendaal, C., 2016, s.l.: IACR. 55 blz. (Cryptology ePrint Archive; vol. 2016/461)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
66 Downloads (Pure)
2015

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 blz. (Cryptology ePrint Archive; vol. 2015/151)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
2 Citaten (Scopus)
197 Downloads (Pure)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (redactie). Berlin: Springer, blz. 488-508 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

Dual EC : a standardized back door

Bernstein, D. J., Lange, T. & Niederhagen, R. F., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/767)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
330 Downloads (Pure)

EdDSA for more curves

Bernstein, D. J., Josefsson, S., Lange, T., Schwabe, P. & Yang, B. Y., 2015, IACR. 5 blz. (Cryptology ePrint Archive; vol. 2015/677)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
161 Downloads (Pure)

How to manipulate curve standards: a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (redactie). Berlin: Springer, blz. 109-139 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)
3 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2015, Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers. Joye, M. & Moradi, A. (redactie). Berlin: Springer, blz. 104-121 (Lecture Notes in Computer Science; vol. 8968).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

SPHINCS : practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (redactie). Berlin: Springer, blz. 368-397 (Lecture Notes in Computer Science; vol. 9056).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

95 Citaten (Scopus)

Tighter, faster, simpler side-channel security evaluations beyond computing power

Bernstein, D. J., Lange, T. & Vredendaal, van, C., 2015, IACR. 25 blz. (Cryptology ePrint Archive; vol. 2015/221)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
212 Downloads (Pure)

TweetNaCl : a crypto library in 100 tweets

Bernstein, D. J., van Gastel, B., Janssen, W., Lange, T., Schwabe, P. & Smetsers, S., 2015, Progress in Cryptology - LATINCRYPT 2014 (Third International Conference on Cryptology and Information Security in Latin America, Florianópolis, Brazil, September 17-19, 2014. Revised Selected Papers). Aranha, D. F. & Menezes, A. (redactie). Berlin: Springer, blz. 64-83 (Lecture Notes in Computer Science; vol. 8895).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

20 Citaten (Scopus)

Twisted Hessian curves

Bernstein, D. J., Chuengsatiansup, C., Kohel, D. & Lange, T., 2015, Progress in Cryptology - LATINCRYPT 2015 (4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (redactie). Cham: Springer, blz. 269-294 26 blz. (Lecture Notes in Computer Science; vol. 9230).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)
2014

Batch NFS

Bernstein, D. J. & Lange, T., 2014, Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Joux, A. & Youssef, A. (redactie). Springer, blz. 38-58 (Lecture Notes in Computer Science; vol. 8781).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)

Batch NFS

Bernstein, D. J. & Lange, T., 2014, IACR. 24 blz. (Cryptology ePrint Archive; vol. 2014/921)

Onderzoeksoutput: Boek/rapportRapportAcademic

Curve41417: Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, IACR. 19 blz. (Cryptology ePrint Archive; vol. 2014/526)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
16 Citaten (Scopus)
347 Downloads (Pure)

Curve41417 : Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings). Batina, L. & Robshaw, M. (redactie). Berlin: Springer, blz. 316-334 (Lecture Notes in Computer Science; vol. 8731).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

16 Citaten (Scopus)

How to manipulate curve standards : a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 blz. (Cryptology ePrint Archive; vol. 2014/571)

Onderzoeksoutput: Boek/rapportRapportAcademic

3 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, IACR. 21 blz. (Cryptology ePrint Archive; vol. 2014/379)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
105 Downloads (Pure)

Hyper-and-elliptic-curve cryptography

Bernstein, D. J. & Lange, T., 2014, In : LMS Journal of Computation and Mathematics. 17, Spec. Issue A, blz. 181-202

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

6 Citaten (Scopus)
14 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2014, IACR. 15 blz. (Cryptology ePrint Archive; vol. 2014/565)

Onderzoeksoutput: Boek/rapportRapportAcademic

Open Access
Bestand
114 Downloads (Pure)

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, Advances in Cryptology - ASIACRYPT 2014 (20th International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2014, Kaohsiung, Taiwan. Proceedings, Part I). Sarkar, P. & Iwata, T. (redactie). Berlin: Springer, blz. 317-337 (Lecture Notes in Computer Science; vol. 8873).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

31 Citaten (Scopus)
2 Downloads (Pure)