Christine van Vredendaal
Christine van Vredendaal
Verified email at nxp.com - Homepage
Title
Cited by
Cited by
Year
NTRU prime: reducing attack surface at low cost
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
International Conference on Selected Areas in Cryptography, 235-260, 2017
1062017
NTRU Prime.
DJ Bernstein, C Chuengsatiansup, T Lange, C Van Vredendaal
IACR Cryptol. ePrint Arch. 2016, 461, 2016
892016
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
662015
Sliding right into disaster: Left-to-right sliding windows leak
DJ Bernstein, J Breitner, D Genkin, LG Bruinderink, N Heninger, T Lange, ...
International Conference on Cryptographic Hardware and Embedded Systems, 555-576, 2017
472017
Tighter, faster, simpler side-channel security evaluations beyond computing power.
DJ Bernstein, T Lange, C van Vredendaal
IACR Cryptol. ePrint Arch. 2015, 221, 2015
362015
A hybrid lattice basis reduction and quantum search attack on LWE
F Göpfert, C van Vredendaal, T Wunderer
International Workshop on Post-Quantum Cryptography, 184-202, 2017
272017
Short generators without quantum computers: the case of multiquadratics
J Bauch, DJ Bernstein, H de Valence, T Lange, C Van Vredendaal
Annual International Conference on the Theory and Applications of …, 2017
252017
Reduced memory meet-in-the-middle attack against the NTRU private key
C van Vredendaal
LMS Journal of Computation and Mathematics 19 (A), 43-57, 2016
242016
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
222016
Kangaroos in side-channel attacks
T Lange, C Van Vredendaal, M Wakker
International Conference on Smart Card Research and Advanced Applications …, 2014
182014
NTRU prime (2016)
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
URL https://eprint. iacr. org/2016/461, 2020
112020
NTRU Prime: round 2
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Post-Quantum Cryptography Standardization Project. NIST, 2019
82019
Fast multiquadratic S-unit computation and application to the calculation of class groups
JF Biasse, C Van Vredendaal
The Open Book Series 2 (1), 103-118, 2019
72019
NTRU Prime [Electronic resource]
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Access mode: https://ntruprime. cr. yp. to/ntruprime-20160511. pdf, 0
6
Rapidly verifiable XMSS signatures
JW Bos, A Hülsing, J Renes, C van Vredendaal
IACR Transactions on Cryptographic Hardware and Embedded Systems, 137-168, 2021
32021
Ntru prime 20171130
DJ Bernstein, T Lange, C van Vredendaal
Fist Round NIST PQC Project Submission Document, 2017
22017
A Quantum Attack on LWE with Arbitrary Error Distribution.
F Göpfert, C Van Vredendaal, T Wunderer
IACR Cryptol. ePrint Arch. 2017, 221, 2017
22017
Method and data processing system for making machine learning model more resistent to adversarial examples
JW Bos, SJ Friedberger, C Kuipers, V Verneuil, N Veshchikov, ...
US Patent App. 16/297,955, 2020
12020
Exploiting mathematical structures in cryptography
C van Vredendaal
12018
Rank estimation methods in side channel attacks
C van Vredendaal
Master’s thesis, Eindhoven University of Technology, 2014. http …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20