Andreas Hülsing

Orcid: 0000-0003-2215-4134

Affiliations:
  • Eindhoven University of Technology, The Netherlands


According to our database1, Andreas Hülsing authored at least 71 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Hybrid-query bounds with partial input control - framework and application to tight M-eTCR.
IACR Cryptol. ePrint Arch., 2025

CAKE requires programming - On the provable post-quantum security of (O)CAKE.
IACR Cryptol. ePrint Arch., 2025

How Hard Can It Be to Formalize a Proof? Lessons from Formalizing CryptoBox Three Times in EasyCrypt.
IACR Cryptol. ePrint Arch., 2025

Starfighters - on the general applicability of X-Wing.
IACR Cryptol. ePrint Arch., 2025

(Un)breakable Curses - Re-encryption in the Fujisaki-Okamoto Transform.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A Key-Update Mechanism for the Space Data Link Security Protocol.
Proceedings of the Cryptology and Network Security - 24th International Conference, 2025

2024
Report on evaluation of KpqC Round-2 candidates.
IACR Cryptol. ePrint Arch., 2024

A Tight Security Proof for $\mathrm{SPHINCS^{+}}$, Formally Verified.
IACR Cryptol. ePrint Arch., 2024

Batch Signatures, Revisited.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

On Round Elimination for Special-Sound Multi-round Identification and the Generality of the Hypercube for MPCitH.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Towards Post-quantum Secure PAKE - A Tight Security Proof for OCAKE in the BPR Model.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

A Tight Security Proof for SPHINCS<sup>+</sup>, Formally Verified.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Report on evaluation of KpqC candidates.
IACR Cryptol. ePrint Arch., 2023

The security of Kyber's FO-transform.
IACR Cryptol. ePrint Arch., 2023

Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$.
IACR Cryptol. ePrint Arch., 2023

Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model.
IACR Cryptol. ePrint Arch., 2023

SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

The Return of the SDitH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Machine-Checked Security for rmXMSS as in RFC 8391 and $\mathrm {SPHINCS^{+}} $.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

SDitH in the QROM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Post Quantum Noise.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Recovering the Tight Security Proof of SPHINCS<sup>+</sup>.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Epochal Signatures for Deniable Group Chats.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Post-quantum WireGuard.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Verifying Post-Quantum Signatures in 8 kB of RAM.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Tight Adaptive Reprogramming in the QROM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Rapidly Verifiable XMSS Signatures.
IACR Cryptol. ePrint Arch., 2020

2019
Tighter proofs of CCA security in the quantum random oracle model.
IACR Cryptol. ePrint Arch., 2019

The SPHINCS+ Signature Framework.
IACR Cryptol. ePrint Arch., 2019

Tighter Proofs of CCA Security in the Quantum Random Oracle Model.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Quantum Indistinguishability of Random Sponges.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

The SPHINCS<sup>+</sup> Signature Framework.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Decisional Second-Preimage Resistance: When Does SPR Imply PRE?
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
XMSS: eXtended Merkle Signature Scheme.
RFC, May, 2018

Post-quantum Security of the Sponge Construction.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

SOFIA: <i>MQ</i> MQ -Based Signatures in the QROM.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
IACR Cryptol. ePrint Arch., 2017

SOFIA: MQ-based signatures in the QROM.
IACR Cryptol. ePrint Arch., 2017

"Oops, I Did It Again" - Security of One-Time Signatures Under Two-Message Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

High-Speed Key Encapsulation from NTRU.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
From 5-pass MQ-based identification to MQ-based signatures.
IACR Cryptol. ePrint Arch., 2016

ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Mitigating Multi-target Attacks in Hash-Based Signatures.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Semantic Security and Indistinguishability in the Quantum World.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

From 5-Pass <i>MQ</i> -Based Identification to <i>MQ</i> -Based Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
ARMed SPHINCS - Computing a 41KB signature in 16KB of RAM.
IACR Cryptol. ePrint Arch., 2015

PALPAS - PAsswordLess PAssword Synchronization.
CoRR, 2015

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

SPHINCS: Practical Stateless Hash-Based Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Bad Directions in Cryptographic Hash Functions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

PALPAS - PAssword Less PAssword Synchronization.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Developing and testing SCoP - a visual hash scheme.
Inf. Manag. Comput. Secur., 2014

SPHINCS: practical stateless hash-based signatures.
IACR Cryptol. ePrint Arch., 2014

How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

2013
Practical forward secure signatures using minimal security assumptions.
PhD thesis, 2013

Instantiating Treeless Signature Schemes.
IACR Cryptol. ePrint Arch., 2013

Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Revocation and Non-repudiation: When the First Destroys the Latter.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Developing and Testing a Visual Hash Scheme.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Proceedings of the Progress in Cryptology, 2013

Optimal Parameters for XMSS MT.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Forward Secure Signatures on Smart Cards.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

How to Avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

On the Security of the Winternitz One-Time Signature Scheme.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2007
Security of Invertible Media Authentication Schemes Revisited.
Proceedings of the Information Hiding, 9th International Workshop, 2007


  Loading...