Christine van Vredendaal
According to our database1,
Christine van Vredendaal
authored at least 25 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Progress in Cryptology - AFRICACRYPT 2025, 2025
2023
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
IACR Cryptol. ePrint Arch., 2023
2022
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2022
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022
Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
IACR Cryptol. ePrint Arch., 2020
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
LMS J. Comput. Math., 2016
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016
2015
IACR Cryptol. ePrint Arch., 2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014