Publication | Date of Publication | Type |
---|
Montgomery Curves and the Montgomery Ladder | 2023-04-21 | Paper |
Verifying post-quantum signatures in 8 kB of RAM | 2022-03-22 | Paper |
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak | 2020-06-24 | Paper |
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies | 2020-02-06 | Paper |
CSIDH: an efficient post-quantum commutative group action | 2019-01-23 | Paper |
HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction | 2018-07-17 | Paper |
Rounded Gaussians -- fast and secure constant-time sampling for lattice-based crypto | 2018-05-29 | Paper |
NTRU prime: reducing attack surface at low cost | 2018-04-26 | Paper |
Lattice Klepto -- turning post-quantum crypto against itself | 2018-04-26 | Paper |
Flush, Gauss, and reload -- a cache attack on the BLISS lattice-based signature scheme | 2018-02-14 | Paper |
Short Generators Without Quantum Computers: The Case of Multiquadratics | 2017-06-13 | Paper |
Dual EC: A Standardized Back Door | 2016-05-02 | Paper |
Batch NFS | 2016-04-13 | Paper |
Bad Directions in Cryptographic Hash Functions | 2015-10-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q2949487 | 2015-10-01 | Paper |
SPHINCS: Practical Stateless Hash-Based Signatures | 2015-09-30 | Paper |
Twisted Hessian Curves | 2015-09-17 | Paper |
TweetNaCl: A Crypto Library in 100 Tweets | 2015-09-17 | Paper |
Curve41417: Karatsuba Revisited | 2015-07-21 | Paper |
Kummer Strikes Back: New DH Speed Records | 2015-01-16 | Paper |
Hyper-and-elliptic-curve cryptography | 2014-09-05 | Paper |
Computing Small Discrete Logarithms Faster | 2014-08-20 | Paper |
Faster Batch Forgery Identification | 2014-08-20 | Paper |
Non-uniform Cracks in the Concrete: The Power of Free Precomputation | 2013-12-10 | Paper |
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild | 2013-12-10 | Paper |
Never Trust a Bunny | 2013-11-19 | Paper |
Quantum Algorithms for the Subset-Sum Problem | 2013-06-14 | Paper |
ECM using Edwards curves | 2013-03-20 | Paper |
The Security Impact of a New Cryptographic Library | 2012-09-21 | Paper |
Elliptic Curves for Applications | 2011-12-16 | Paper |
Wild McEliece Incognito | 2011-11-25 | Paper |
High-Speed High-Security Signatures | 2011-10-07 | Paper |
Smaller Decoding Exponents: Ball-Collision Decoding | 2011-08-12 | Paper |
Really Fast Syndrome-Based Hashing | 2011-06-29 | Paper |
Faster 2-Regular Information-Set Decoding | 2011-06-08 | Paper |
Faster computation of the Tate pairing | 2011-04-08 | Paper |
A complete set of addition laws for incomplete Edwards curves | 2011-04-08 | Paper |
Wild McEliece | 2011-03-15 | Paper |
On the Correct Use of the Negation Map in the Pollard rho Method | 2011-03-15 | Paper |
ECC2K-130 on NVIDIA GPUs | 2010-12-07 | Paper |
Starfish on Strike | 2010-08-31 | Paper |
Type-II Optimal Polynomial Bases | 2010-07-20 | Paper |
Faster Pairing Computations on Curves with High-Degree Twists | 2010-05-28 | Paper |
FSBday | 2009-12-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q3635533 | 2009-07-06 | Paper |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions | 2009-06-08 | Paper |
ECM on Graphics Cards | 2009-05-12 | Paper |
Revisiting Pairing Based Group Key Exchange | 2009-02-12 | Paper |
Attacking and Defending the McEliece Cryptosystem | 2008-11-11 | Paper |
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng | 2008-09-09 | Paper |
Twisted Edwards Curves | 2008-06-13 | Paper |
Faster Addition and Doubling on Elliptic Curves | 2008-05-15 | Paper |
Inverted Edwards Coordinates | 2008-04-17 | Paper |
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication | 2008-04-11 | Paper |
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2 | 2008-03-17 | Paper |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | 2008-03-17 | Paper |
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups | 2008-03-07 | Paper |
Distribution of some sequences of points on elliptic curves | 2008-02-21 | Paper |
Coding and Cryptography | 2007-05-02 | Paper |
Algorithmic Number Theory | 2007-05-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q3421465 | 2007-02-13 | Paper |
Selected Areas in Cryptography | 2006-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5706769 | 2005-11-23 | Paper |
Algorithmic Number Theory | 2005-08-12 | Paper |
Certain Exponential Sums and Random Walks on Elliptic Curves | 2005-06-23 | Paper |
Koblitz curve cryptosystems | 2005-06-01 | Paper |
Formulae for arithmetic on genus 2 hyperelliptic curves | 2005-04-15 | Paper |
Collisions in fast generation of ideal classes and points on hyperelliptic and elliptic curves | 2005-04-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4665918 | 2005-04-11 | Paper |
On using expansions to the base of −2 | 2004-12-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4808631 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434888 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4426684 | 2003-09-16 | Paper |
Interpolation of the discrete logarithm in \(\mathbb{F}_{q}\) by Boolean functions and by polynomials in several variables modulo a divisor of \(q-1\). | 2003-06-10 | Paper |
Linear complexity of the discrete logarithm | 2003-04-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4530230 | 2002-06-02 | Paper |
Incomplete character sums over finite fields and their application to the interpolation of the discrete logarithm by Boolean functions | 2002-02-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2762749 | 2002-01-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741445 | 2001-10-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q2712122 | 2001-05-06 | Paper |
Factoring polynomials over arbitrary finite fields | 2000-08-21 | Paper |