#### Writes About:

#### Filter Results:

- Full text PDF available (11)

#### Publication Year

2014

2017

- This year (0)
- Last 5 years (13)
- Last 10 years (13)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Daniel J. Bernstein, Tung Chou, +4 authors Christine van Vredendaal
- IACR Cryptology ePrint Archive
- 2014

This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a… (More)

- Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal
- IACR Cryptology ePrint Archive
- 2015

A Eurocrypt 2013 paper “Security evaluations beyond computing power: How to analyze side-channel attacks you cannot mount?” by Veyrat-Charvillon, Gérard, and Standaert proposed a “Rank Estimation… (More)

Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading… (More)

- Daniel J. Bernstein, Joachim Breitner, +5 authors Yuval Yarom
- IACR Cryptology ePrint Archive
- 2017

It is well known that constant-time implementations of modular exponentiation cannot use sliding windows. However, software libraries such as Libgcrypt, used by GnuPG, continue to use sliding… (More)

- Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
- IACR Cryptology ePrint Archive
- 2016

Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading… (More)

- Tanja Lange, Christine van Vredendaal, Marnix Wakker
- IACR Cryptology ePrint Archive
- 2014

Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore.… (More)

- Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
- IACR Cryptology ePrint Archive
- 2017

Finding a short element g of a number field, given the ideal generated by g, is a classic problem in computational algebraic number theory. Solving this problem recovers the private key in… (More)

- Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
- IACR Cryptology ePrint Archive
- 2017

- Daniel J. Bernstein, Joachim Breitner, +5 authors Yuval Yarom
- 2017

It is well known that constant-time implementations of modular exponentiation cannot use sliding windows. However, software libraries such as Libgcrypt, used by GnuPG, continue to use sliding… (More)

- Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
- PQCrypto
- 2017

Recently, an increasing amount of papers proposing postquantum schemes also provide concrete parameter sets aiming for concrete post-quantum security levels. Security evaluations of such schemes need… (More)