[go: up one dir, main page]

Follow
Ruben Niederhagen
Ruben Niederhagen
Assistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern Denmark
Verified email at polycephaly.org - Homepage
Title
Cited by
Cited by
Year
SPHINCS: practical stateless hash-based signatures
DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ...
Annual international conference on the theory and applications of …, 2015
6322015
The SPHINCS+ Signature Framework
DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
5912019
Classic McEliece: conservative code-based cryptography
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
NIST submissions 1 (1), 1-25, 2017
510*2017
On the practical exploitability of Dual EC in TLS implementations
S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ...
23rd USENIX Security Symposium (USENIX Security 14), 319-335, 2014
2072014
Dual EC: A standardized back door
DJ Bernstein, T Lange, R Niederhagen
The new codebreakers: essays dedicated to David Kahn on the occasion of his …, 2016
1952016
New software speed records for cryptographic pairings
M Naehrig, R Niederhagen, P Schwabe
International Conference on Cryptology and Information Security in Latin …, 2010
1572010
Fast exhaustive search for polynomial systems in F2
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
1422010
SPHINCS+
DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, SL Gazdag, ...
NIST submissions, 2017
123*2017
ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V.
E Alkim, H Evkan, N Lahr, R Niederhagen, R Petri
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020
1202020
Post-quantum TLS on embedded systems: Integrating and evaluating Kyber and SPHINCS+ with mbed TLS
K Bürstinghaus-Steinbach, C Krauß, R Niederhagen, M Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
1062020
FPGA-based Niederreiter cryptosystem using binary Goppa codes
W Wang, J Szefer, R Niederhagen
International Conference on Post-Quantum Cryptography, 77-98, 2018
1022018
XMSS and embedded systems: XMSS hardware accelerators for RISC-V
W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen
International Conference on Selected Areas in Cryptography, 523-550, 2019
912019
How to Manipulate Curve Standards: A White Paper for the Black Hat
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
892015
Breaking ECC2K-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptol. ePrint Arch. 2009, 541, 2009
802009
Take your MEDS: Digital signatures from matrix code equivalence
T Chou, R Niederhagen, E Persichetti, TH Randrianarisoa, K Reijnders, ...
Cryptology ePrint Archive, 2022
752022
Solving quadratic equations with XL on parallel architectures
CM Cheng, T Chou, R Niederhagen, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 356-373, 2012
652012
Polynomial multiplication in NTRU Prime: Comparison of optimization strategies on Cortex-M4
E Alkim, DYL Cheng, CMM Chung, H Evkan, LWL Huang, V Hwang, ...
Cryptology ePrint Archive, 2020
612020
FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes
W Wang, J Szefer, R Niederhagen
International Conference on Cryptographic Hardware and Embedded Systems, 253-274, 2017
592017
Complete and improved FPGA implementation of classic McEliece
PJ Chen, T Chou, S Deshpande, N Lahr, R Niederhagen, J Szefer, ...
Cryptology ePrint Archive, 2022
482022
Post-quantum secure boot
VBY Kumar, N Gupta, A Chattopadhyay, M Kasper, C Krauß, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020
452020
The system can't perform the operation now. Try again later.
Articles 1–20