Ruben Niederhagen
Ruben Niederhagen
Assistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern Denmark
Geverifieerd e-mailadres voor polycephaly.org - Homepage
Geciteerd door
Geciteerd door
SPHINCS: practical stateless hash-based signatures
DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ...
Annual international conference on the theory and applications of …, 2015
Classic McEliece: conservative code-based cryptography
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
NIST submissions, 2017
On the practical exploitability of Dual EC in TLS implementations
S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ...
23rd USENIX Security Symposium (USENIX Security 14), 319-335, 2014
The SPHINCS+ Signature Framework
DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
New software speed records for cryptographic pairings
M Naehrig, R Niederhagen, P Schwabe
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
Dual EC: A standardized back door
DJ Bernstein, T Lange, R Niederhagen
The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His …, 2016
Fast exhaustive search for polynomial systems in F2.
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
CHES 6225, 203-218, 2010
How to Manipulate Curve Standards: A White Paper for the Black Hat
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
Breaking ECC2K-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptol. ePrint Arch. 2009, 541, 2009
FPGA-based Niederreiter cryptosystem using binary Goppa codes
W Wang, J Szefer, R Niederhagen
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018
ISA extensions for finite field arithmetic accelerating Kyber and NewHope on RISC-V
E Alkim, H Evkan, N Lahr, R Niederhagen, R Petri
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3), 2020
DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, SL Gazdag, ...
NIST submissions, 2017
XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V
W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen
Selected Areas in Cryptography–SAC 2019: 26th International Conference …, 2020
FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes
W Wang, J Szefer, R Niederhagen
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
Solving quadratic equations with XL on parallel architectures
CM Cheng, T Chou, R Niederhagen, BY Yang
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
DJ Bernstein, T Lange, R Niederhagen, C Peters, P Schwabe
International Conference on Cryptology in India, 18-38, 2009
Post-quantum TLS on embedded systems: Integrating and evaluating Kyber and SPHINCS+ with mbed TLS
K Bürstinghaus-Steinbach, C Krauß, R Niederhagen, M Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
ECC2K-130 on Cell CPUs
JW Bos, T Kleinjung, R Niederhagen, P Schwabe
International Conference on Cryptology in Africa, 225-242, 2010
ECC2K-130 on Nvidia GPUs
DJ Bernstein, HC Chen, CM Cheng, T Lange, R Niederhagen, ...
International conference on cryptology in India, 328-346, 2010
Fast exhaustive search for quadratic systems in on FPGAs
C Bouillaguet, CM Cheng, T Chou, R Niederhagen, BY Yang
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20