[go: up one dir, main page]

Follow
Christine van Vredendaal
Christine van Vredendaal
Verified email at nxp.com - Homepage
Title
Cited by
Cited by
Year
NTRU prime: reducing attack surface at low cost
DJ Bernstein, C Chuengsatiansup, T Lange, C Van Vredendaal
International Conference on Selected Areas in Cryptography, 235-260, 2017
4492017
Masking kyber: First-and higher-order implementations
JW Bos, M Gourjon, J Renes, T Schneider, C Van Vredendaal
IACR Transactions on Cryptographic Hardware and Embedded Systems, 173-214, 2021
1522021
Chosen ciphertext k-trace attacks on masked cca2 secure kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
982021
Sliding right into disaster: Left-to-right sliding windows leak
DJ Bernstein, J Breitner, D Genkin, L Groot Bruinderink, N Heninger, ...
International Conference on Cryptographic Hardware and Embedded Systems, 555-576, 2017
902017
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55. cr. yp. to
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
882015
A hybrid lattice basis reduction and quantum search attack on LWE
F Göpfert, C van Vredendaal, T Wunderer
International Workshop on Post-Quantum Cryptography, 184-202, 2017
692017
Protecting dilithium against leakage: Revisited sensitivity analysis and improved implementations
M Azouaoui, O Bronchain, G Cassiers, C Hoffmann, Y Kuzovkova, ...
Cryptology ePrint Archive, 2022
632022
Tighter, faster, simpler side-channel security evaluations beyond computing power
DJ Bernstein, T Lange, C van Vredendaal
IACR, 2015
552015
Short generators without quantum computers: the case of multiquadratics
J Bauch, DJ Bernstein, H de Valence, T Lange, C Van Vredendaal
Annual International Conference on the Theory and Applications of …, 2017
532017
Rapidly verifiable XMSS signatures
JW Bos, A Hülsing, J Renes, C van Vredendaal
IACR Transactions on Cryptographic Hardware and Embedded Systems, 137-168, 2021
492021
NTRU Prime: round 2
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Submission to the NIST PQC standardization process, URl: https://ntruprime …, 2019
372019
Reduced memory meet-in-the-middle attack against the NTRU private key
C van Vredendaal
LMS Journal of Computation and Mathematics 19 (A), 43-57, 2016
342016
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
322016
Post-quantum authenticated encryption against chosen-ciphertext side-channel attacks
M Azouaoui, Y Kuzovkova, T Schneider, C van Vredendaal
IACR Transactions on Cryptographic Hardware and Embedded Systems, 372-396, 2022
242022
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
M Azouaoui, O Bronchain, G Cassiers, C Hoffmann, Y Kuzovkova, ...
IACR Cryptol. ePrint Arch. 2022, 1406, 2022
242022
Fast multiquadratic S-unit computation and application to the calculation of class groups
JF Biasse, C Van Vredendaal
The Open Book Series 2 (1), 103-118, 2019
242019
Kangaroos in side-channel attacks
T Lange, C Van Vredendaal, M Wakker
International Conference on Smart Card Research and Advanced Applications …, 2014
202014
Enabling FrodoKEM on embedded devices
JW Bos, O Bronchain, F Custers, J Renes, D Verbakel, C van Vredendaal
Cryptology ePrint Archive, 2023
182023
{Post-Quantum} Cryptography with Contemporary {Co-Processors}: Beyond Kronecker,{Schönhage-Strassen} & Nussbaumer
JW Bos, J Renes, C van Vredendaal
31st USENIX Security Symposium (USENIX Security 22), 3683-3697, 2022
18*2022
From MLWE to RLWE: A differential fault attack on randomized & deterministic dilithium
M ElGhamrawy, M Azouaoui, O Bronchain, J Renes, T Schneider, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023
172023
The system can't perform the operation now. Try again later.
Articles 1–20