Joost Renes

Orcid: 0000-0003-1884-6330

According to our database1, Joost Renes authored at least 30 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2025

2024
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications.
IEEE Trans. Emerg. Top. Comput., 2024

2023
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
IACR Cryptol. ePrint Arch., 2023

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2023

Post-Quantum Secure Over-the-Air Update of Automotive Systems.
IACR Cryptol. ePrint Arch., 2023

Enabling FrodoKEM on Embedded Devices.
IACR Cryptol. ePrint Arch., 2023

PQ.V.ALU.E: Post-quantum RISC-V Custom ALU Extensions on Dilithium and Kyber.
Proceedings of the Smart Card Research and Advanced Applications, 2023

2022
Post-Quantum Secure Boot on Vehicle Network Processors.
IACR Cryptol. ePrint Arch., 2022

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
Proceedings of the 31st USENIX Security Symposium, 2022

Dilithium for Memory Constrained Devices.
Proceedings of the Progress in Cryptology, 2022

2021
Masking Kyber: First- and Higher-Order Implementations.
IACR Cryptol. ePrint Arch., 2021

Cyber Resilience for Self-Monitoring IoT Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

The Matrix Reloaded: Multiplication Strategies in FrodoKEM.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
A Compact and Scalable Hardware/Software Co-design of SIKE.
IACR Cryptol. ePrint Arch., 2020

Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
IACR Cryptol. ePrint Arch., 2020

Rapidly Verifiable XMSS Signatures.
IACR Cryptol. ePrint Arch., 2020

Improved Classical Cryptanalysis of SIKE in Practice.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem.
IACR Cryptol. ePrint Arch., 2019

Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography.
IACR Cryptol. ePrint Arch., 2018

Computing Isogenies Between Montgomery Curves Using the Action of (0, 0).
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

CSIDH: An Efficient Post-Quantum Commutative Group Action.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Efficient Compression of SIDH Public Keys.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

qDSA: Small and Secure Digital Signatures with Curve-Based Diffie-Hellman Key Pairs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers.
CoRR, 2016

Implementing Complete Formulas on Weierstrass Curves in Hardware.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Complete Addition Formulas for Prime Order Elliptic Curves.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016


  Loading...