Christine van Vredendaal

According to our database1, Christine van Vredendaal authored at least 25 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Post-Quantum Cryptography in eMRTDs: Evaluating PAKE and PKI for Travel Documents.
IACR Cryptol. ePrint Arch., 2025

Tearing Solutions for Tree Traversal in Stateful Hash-Based Cryptography.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2025, 2025

2023
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
IACR Cryptol. ePrint Arch., 2023

Enabling FrodoKEM on Embedded Devices.
IACR Cryptol. ePrint Arch., 2023

2022
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2022

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.
IACR Cryptol. ePrint Arch., 2021

Masking Kyber: First- and Higher-Order Implementations.
IACR Cryptol. ePrint Arch., 2021

The Matrix Reloaded: Multiplication Strategies in FrodoKEM.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
IACR Cryptol. ePrint Arch., 2020

Rapidly Verifiable XMSS Signatures.
IACR Cryptol. ePrint Arch., 2020

2017
A Quantum Attack on LWE with Arbitrary Error Distribution.
IACR Cryptol. ePrint Arch., 2017

NTRU Prime: Reducing Attack Surface at Low Cost.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Short Generators Without Quantum Computers: The Case of Multiquadratics.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Reduced memory meet-in-the-middle attack against the NTRU private key.
LMS J. Comput. Math., 2016

NTRU Prime.
IACR Cryptol. ePrint Arch., 2016

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

2015
Tighter, faster, simpler side-channel security evaluations beyond computing power.
IACR Cryptol. ePrint Arch., 2015

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

2014
How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

Kangaroos in Side-Channel Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2014


  Loading...