Tanja Lange
Tanja Lange
Professor Cryptology, Technische Universiteit Eindhoven, the Netherlands
Bestätigte E-Mail-Adresse bei tue.nl - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Handbook of elliptic and hyperelliptic curve cryptography
H Cohen, G Frey, R Avanzi, C Doche, T Lange, K Nguyen, F Vercauteren
CRC press, 2005
14972005
Post-quantum cryptography
DJ Bernstein, T Lange
Nature 549 (7671), 188-194, 2017
1171*2017
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual international cryptology conference, 205-222, 2005
6242005
Faster addition and doubling on elliptic curves
DJ Bernstein, T Lange
International Conference on the Theory and Application of Cryptology and …, 2007
5322007
Twisted edwards curves
DJ Bernstein, P Birkner, M Joye, T Lange, C Peters
International Conference on Cryptology in Africa, 389-405, 2008
4302008
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
3992012
Attacking and defending the McEliece cryptosystem
DJ Bernstein, T Lange, C Peters
International Workshop on Post-Quantum Cryptography, 31-46, 2008
3892008
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of Cryptology 21 (3), 350-391, 2008
3832008
Explicit-formulas database [Electronic resource]
DJ Bernstein, T Lange
Режим доступу: http://www. hyperelliptic. org/EFD, 2013
275*2013
SPHINCS: practical stateless hash-based signatures
DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ...
Annual International Conference on the Theory and Applications of …, 2015
2612015
eBACS: ECRYPT benchmarking of cryptographic systems
DJ Bernstein, T Lange
2582013
The security impact of a new cryptographic library
DJ Bernstein, T Lange, P Schwabe
International Conference on Cryptology and Information Security in Latin …, 2012
2292012
Formulae for arithmetic on genus 2 hyperelliptic curves
T Lange
Applicable Algebra in Engineering, Communication and Computing 15 (5), 295-328, 2005
1752005
Smaller decoding exponents: ball-collision decoding
DJ Bernstein, T Lange, C Peters
Annual Cryptology Conference, 743-760, 2011
1732011
Ntru prime: reducing attack surface at low cost
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
International Conference on Selected Areas in Cryptography, 235-260, 2017
169*2017
SafeCurves: choosing safe curves for elliptic-curve cryptography
DJ Bernstein, T Lange
Avialable online at http://safecurves. cr. yp. to, 2013
161*2013
Binary edwards curves
DJ Bernstein, T Lange, RR Farashahi
International Workshop on Cryptographic Hardware and Embedded Systems, 244-265, 2008
1602008
Flush, gauss, and reload–a cache attack on the bliss lattice-based signature scheme
LG Bruinderink, A Hülsing, T Lange, Y Yarom
International Conference on Cryptographic Hardware and Embedded Systems, 323-345, 2016
1512016
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Cryptographic Hardware and Embedded Systems–CHES 2011 6917, 124-142, 2011
1392011
CSIDH: an efficient post-quantum commutative group action
W Castryck, T Lange, C Martindale, L Panny, J Renes
International Conference on the Theory and Application of Cryptology and …, 2018
1322018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20