List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Formally verifying Kyber. Episode V: machine-checked IND-CCA security and correctness of ML-KEM in Easycrypt | 2024-12-04 | Paper |
| Semantic foundations for cost analysis of pipeline-optimized programs Static Analysis | 2023-07-28 | Paper |
| More efficient post-quantum KEMTLS with pre-distributed public keys | 2022-06-15 | Paper |
| Footprint scheduling for dining-cryptographer networks Financial Cryptography and Data Security | 2021-04-07 | Paper |
| Vectorizing higher-order masking Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
| High-speed key encapsulation from NTRU Lecture Notes in Computer Science | 2020-06-24 | Paper |
| The complete cost of cofactor \(h=1\) | 2020-05-12 | Paper |
| Memory-efficient high-speed implementation of Kyber on Cortex-M4 | 2020-05-06 | Paper |
| Faster multiplication in \(\mathbb{Z}_{2^m}[x\) on Cortex-M4 to speed up NIST PQC candidates] | 2020-01-30 | Paper |
| Solving binary \(\mathcal {MQ}\) with Grover's algorithm | 2018-10-26 | Paper |
| SOFIA: \(\mathcal{MQ}\)-based signatures in the QROM | 2018-05-29 | Paper |
| Attacking embedded ECC implementations through CMOV side channels | 2018-02-16 | Paper |
| All the AES you need on Cortex-M3 and M4 | 2018-02-16 | Paper |
| NaCl's \texttt{crypto\(\_\)box} in hardware | 2018-02-14 | Paper |
| From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
| ARMed SPHINCS Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
| High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Designs, Codes and Cryptography | 2015-10-26 | Paper |
| SPHINCS: practical stateless hash-based signatures Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
| TweetNaCl: A Crypto Library in 100 Tweets Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
| Full-size high-security ECC implementation on MSP430 microcontrollers Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
| High-speed signatures from standard lattices Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
| Online template attacks Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
| Kummer strikes back: new DH speed records Lecture Notes in Computer Science | 2015-01-16 | Paper |
| PandA: pairings and arithmetic Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
| McBits: fast constant-time code-based cryptography Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
| Software speed records for lattice-based signatures Post-Quantum Cryptography | 2013-06-14 | Paper |
| Nacl on 8-bit AVR microcontrollers Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
| Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
| The security impact of a new cryptographic library Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
| SHA-3 on ARM11 processors Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
| High-speed high-security signatures Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
| Really fast syndrome-based hashing Lecture Notes in Computer Science | 2011-06-29 | Paper |
| Faster 2-regular information-set decoding Lecture Notes in Computer Science | 2011-06-08 | Paper |
| On the correct use of the negation map in the Pollard rho method Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
| ECC2K-130 on NVIDIA GPUs Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
| New Software Speed Records for Cryptographic Pairings Lecture Notes in Computer Science | 2010-08-31 | Paper |
| ECC2K-130 on Cell CPUs Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
| FSBday Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
| Faster and Timing-Attack Resistant AES-GCM Lecture Notes in Computer Science | 2009-11-10 | Paper |
| Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves Lecture Notes in Computer Science | 2009-11-10 | Paper |
| Fast Elliptic-Curve Cryptography on the Cell Broadband Engine Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
| New AES Software Speed Records Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
| On Compressible Pairings and Their Computation Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Research outcomes over time
This page was built for person: Peter Schwabe