Jan-Pieter D'Anvers

Orcid: 0000-0001-9675-7988

Affiliations:
  • KU Leuven, Belgium


According to our database1, Jan-Pieter D'Anvers authored at least 29 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Don't be mean: Reducing Approximation Noise in TFHE through Mean Compensation.
IACR Cryptol. ePrint Arch., 2025

SMOOTHIE: (Multi-)Scalar Multiplication Optimizations On TFHE.
IACR Cryptol. ePrint Arch., 2025

Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2025

Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell.
Proceedings of the 34th USENIX Security Symposium, 2025

X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for d+1 Shares in Hardware.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

2024
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results.
ACM Trans. Embed. Comput. Syst., March, 2024

Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC.
IACR Cryptol. ePrint Arch., 2024

2023
Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-Sliced Implementations.
IEEE Trans. Computers, February, 2023

Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber.
IACR Cryptol. ePrint Arch., 2023

Neural Network Quantisation for Faster Homomorphic Encryption.
Proceedings of the 29th International Symposium on On-Line Testing and Robust System Design, 2023

One-Hot Conversion: Towards Faster Table-Based A2B Conversion.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond.
IACR Cryptol. ePrint Arch., 2022

FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2022

Higher-Order Masked Saber.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

2021
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography.
IACR Cryptol. ePrint Arch., 2021

Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.
IACR Cryptol. ePrint Arch., 2021

Analysis and Comparison of Table-based Arithmetic to Boolean Masking.
IACR Cryptol. ePrint Arch., 2021

Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021

2020
A Side-Channel Resistant Implementation of SABER.
IACR Cryptol. ePrint Arch., 2020

(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Exploiting Decryption Failures in Mersenne Number Cryptosystems.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes.
IACR Cryptol. ePrint Arch., 2019

The Impact of Error Dependencies on Ring/Mod-LWE/LWR Based Schemes.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Timing Attacks on Error Correcting Codes in Post-Quantum Schemes.
Proceedings of ACM Workshop on Theory of Implementation Security, 2019

2018
On the impact of decryption failures on the security of LWE/LWR based schemes.
IACR Cryptol. ePrint Arch., 2018

Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018


  Loading...