Christine van Vredendaal

According to our database1, Christine van Vredendaal authored at least 23 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Enabling FrodoKEM on Embedded Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

2022
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Rapidly Verifiable XMSS Signatures.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Masking Kyber: First- and Higher-Order Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

The Matrix Reloaded: Multiplication Strategies in FrodoKEM.
IACR Cryptol. ePrint Arch., 2021

2020
Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
IACR Cryptol. ePrint Arch., 2020

2017
A Quantum Attack on LWE with Arbitrary Error Distribution.
IACR Cryptol. ePrint Arch., 2017

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
IACR Cryptol. ePrint Arch., 2017

Sliding right into disaster: Left-to-right sliding windows leak.
IACR Cryptol. ePrint Arch., 2017

Short generators without quantum computers: the case of multiquadratics.
IACR Cryptol. ePrint Arch., 2017

NTRU Prime: Reducing Attack Surface at Low Cost.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

2016
Reduced memory meet-in-the-middle attack against the NTRU private key.
LMS J. Comput. Math., 2016

NTRU Prime.
IACR Cryptol. ePrint Arch., 2016

2015
Tighter, faster, simpler side-channel security evaluations beyond computing power.
IACR Cryptol. ePrint Arch., 2015

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

2014
Kangaroos in Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014


  Loading...