NTRU prime: reducing attack surface at low cost DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal International Conference on Selected Areas in Cryptography, 235-260, 2017 | 93 | 2017 |
NTRU Prime. DJ Bernstein, C Chuengsatiansup, T Lange, C Van Vredendaal IACR Cryptol. ePrint Arch. 2016, 461, 2016 | 83 | 2016 |
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ... International Conference on Research in Security Standardisation, 109-139, 2015 | 63 | 2015 |
Sliding right into disaster: Left-to-right sliding windows leak DJ Bernstein, J Breitner, D Genkin, LG Bruinderink, N Heninger, T Lange, ... International Conference on Cryptographic Hardware and Embedded Systems, 555-576, 2017 | 45 | 2017 |
Tighter, faster, simpler side-channel security evaluations beyond computing power. DJ Bernstein, T Lange, C van Vredendaal IACR Cryptol. ePrint Arch. 2015, 221, 2015 | 34 | 2015 |
A hybrid lattice basis reduction and quantum search attack on LWE F Göpfert, C van Vredendaal, T Wunderer International Workshop on Post-Quantum Cryptography, 184-202, 2017 | 26 | 2017 |
Short generators without quantum computers: the case of multiquadratics J Bauch, DJ Bernstein, H de Valence, T Lange, C Van Vredendaal Annual International Conference on the Theory and Applications of …, 2017 | 25 | 2017 |
Reduced memory meet-in-the-middle attack against the NTRU private key C van Vredendaal LMS Journal of Computation and Mathematics 19 (A), 43-57, 2016 | 22 | 2016 |
Creating cryptographic challenges using multi-party computation: The LWE challenge J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ... Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016 | 21 | 2016 |
Kangaroos in side-channel attacks T Lange, C Van Vredendaal, M Wakker International Conference on Smart Card Research and Advanced Applications …, 2014 | 17 | 2014 |
NTRU prime (2016) DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal URL https://eprint. iacr. org/2016/461, 2020 | 11 | 2020 |
Fast multiquadratic S-unit computation and application to the calculation of class groups JF Biasse, C Van Vredendaal The Open Book Series 2 (1), 103-118, 2019 | 7 | 2019 |
NTRU Prime [Electronic resource] DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Access mode: https://ntruprime. cr. yp. to/ntruprime-20160511. pdf, 0 | 6 | |
NTRU Prime: round 2 DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Submission to the NIST PQC standardization process, URl: https://ntruprime …, 2019 | 5 | 2019 |
Ntru prime 20171130 DJ Bernstein, T Lange, C van Vredendaal Fist Round NIST PQC Project Submission Document, 2017 | 2 | 2017 |
A Quantum Attack on LWE with Arbitrary Error Distribution. F Göpfert, C Van Vredendaal, T Wunderer IACR Cryptol. ePrint Arch. 2017, 221, 2017 | 2 | 2017 |
Rapidly Verifiable XMSS Signatures JW Bos, A Hülsing, J Renes, C van Vredendaal IACR Transactions on Cryptographic Hardware and Embedded Systems, 137-168, 2021 | 1 | 2021 |
Method and data processing system for making machine learning model more resistent to adversarial examples JW Bos, SJ Friedberger, C Kuipers, V Verneuil, N Veshchikov, ... US Patent App. 16/297,955, 2020 | 1 | 2020 |
Exploiting mathematical structures in cryptography C van Vredendaal | 1 | 2018 |
Rank estimation methods in side channel attacks C van Vredendaal Master’s thesis, Eindhoven University of Technology, 2014. http …, 2014 | 1 | 2014 |