Joost Renes

Orcid: 0000-0003-1884-6330

According to our database1, Joost Renes authored at least 28 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Enabling FrodoKEM on Embedded Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber.
IACR Cryptol. ePrint Arch., 2023

Post-Quantum Secure Over-the-Air Update of Automotive Systems.
IACR Cryptol. ePrint Arch., 2023

2022
Dilithium for Memory Constrained Devices.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum Secure Boot on Vehicle Network Processors.
IACR Cryptol. ePrint Arch., 2022

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Rapidly Verifiable XMSS Signatures.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Masking Kyber: First- and Higher-Order Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

The Matrix Reloaded: Multiplication Strategies in FrodoKEM.
IACR Cryptol. ePrint Arch., 2021

Cyber Resilience for Self-Monitoring IoT Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
A Compact and Scalable Hardware/Software Co-design of SIKE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
IACR Cryptol. ePrint Arch., 2020

Improved Classical Cryptanalysis of SIKE in Practice.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
On Kummer Lines with Full Rational 2-torsion and Their Usage in Cryptography.
ACM Trans. Math. Softw., 2019

Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography.
IACR Cryptol. ePrint Arch., 2019

Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem.
IACR Cryptol. ePrint Arch., 2019

2018
CSIDH: An Efficient Post-Quantum Commutative Group Action.
IACR Cryptol. ePrint Arch., 2018

2017
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs.
IACR Cryptol. ePrint Arch., 2017

Computing isogenies between Montgomery curves using the action of (0, 0).
IACR Cryptol. ePrint Arch., 2017

2016
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers.
IACR Cryptol. ePrint Arch., 2016

Implementing Complete Formulas on Weierstrass Curves in Hardware.
IACR Cryptol. ePrint Arch., 2016

Efficient compression of SIDH public keys.
IACR Cryptol. ePrint Arch., 2016

$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers.
CoRR, 2016

2015
Complete addition formulas for prime order elliptic curves.
IACR Cryptol. ePrint Arch., 2015


  Loading...