Obserwuj
Tanja Lange
Tytuł
Cytowane przez
Cytowane przez
Rok
Post-quantum cryptography
DJ Bernstein, T Lange
Nature 549 (7671), 188-194, 2017
1756*2017
Handbook of elliptic and hyperelliptic curve cryptography
H Cohen, G Frey, R Avanzi, C Doche, T Lange, K Nguyen, F Vercauteren
CRC press, 2005
16612005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
7302005
Faster addition and doubling on elliptic curves
DJ Bernstein, T Lange
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
6382007
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
5792012
Twisted edwards curves
DJ Bernstein, P Birkner, M Joye, T Lange, C Peters
Lecture Notes in Computer Science 5023, 389-405, 2008
5782008
Attacking and defending the McEliece cryptosystem
DJ Bernstein, T Lange, C Peters
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008
4662008
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21, 350-391, 2008
4172008
SPHINCS: practical stateless hash-based signatures
DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ...
Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015
3912015
CSIDH: an efficient post-quantum commutative group action
W Castryck, T Lange, C Martindale, L Panny, J Renes
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
3872018
eBACS: ECRYPT benchmarking of cryptographic systems
DJ Bernstein, T Lange
3242009
The security impact of a new cryptographic library
DJ Bernstein, T Lange, P Schwabe
Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012
3072012
Explicit-formulas database [Electronic resource]
DJ Bernstein, T Lange
URL: https://hyperelliptic. org/EFD, 2013
304*2013
NTRU prime: reducing attack surface at low cost
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018
280*2018
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
2772006
SafeCurves: choosing safe curves for elliptic-curve cryptography
DJ Bernstein, T Lange
URL: http://safecurves. cr. yp. to, 2013
233*2013
Smaller decoding exponents: ball-collision decoding
DJ Bernstein, T Lange, C Peters
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
2302011
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Cryptographic Hardware and Embedded Systems–CHES 2011 6917, 124-142, 2011
2182011
Flush, gauss, and reload–a cache attack on the BLISS lattice-based signature scheme
L Groot Bruinderink, A Hülsing, T Lange, Y Yarom
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
2152016
Elligator: elliptic-curve points indistinguishable from uniform random strings
DJ Bernstein, M Hamburg, A Krasnova, T Lange
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1992013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20