Peter Schwabe

Orcid: 0000-0002-1310-0997

According to our database1, Peter Schwabe authored at least 112 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025


Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code.
IACR Cryptol. ePrint Arch., 2025

Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Towards ML-KEM & ML-DSA on OpenTitan.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Formally Verified Correctness Bounds for Lattice-Based Cryptography.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Protecting Cryptographic Code Against Spectre-RSB: (and, in Fact, All Known Spectre Variants).
Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025

2024
Protecting cryptographic code against Spectre-RSB.
IACR Cryptol. ePrint Arch., 2024

X-Wing: The Hybrid KEM You've Been Looking For.
IACR Cryptol. ePrint Arch., 2024

Optimizations and Practicality of High-Security CSIDH.
IACR Commun. Cryptol., 2024

X-Wing.
IACR Commun. Cryptol., 2024

SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange.
Proceedings of the 33rd USENIX Security Symposium, 2024

"These results must be false": A usability evaluation of constant-time analysis tools.
Proceedings of the 33rd USENIX Security Symposium, 2024

Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
SoK: SCA-secure ECC in software - mission impossible?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Formally verifying Kyber Episode IV: Implementation correctness.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

High-assurance zeroization.
IACR Cryptol. ePrint Arch., 2023

Swoosh: Practical Lattice-Based Non-Interactive Key Exchange.
IACR Cryptol. ePrint Arch., 2023

On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH.
IACR Cryptol. ePrint Arch., 2023

Kyber terminates.
IACR Cryptol. ePrint Arch., 2023

Formally verifying Kyber Part I: Implementation Correctness.
IACR Cryptol. ePrint Arch., 2023

Ultimate SLH: Taking Speculative Load Hardening to the Next Level.
Proceedings of the 32nd USENIX Security Symposium, 2023

Typing High-Speed Cryptography against Spectre v1.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Spectre Declassified: Reading from the Right Place at the Wrong Time.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Post-Quantum Multi-Recipient Public Key Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Breaking and Fixing Speculative Load Hardening.
IACR Cryptol. ePrint Arch., 2022

First-Order Masked Kyber on ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2022

"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Semantic Foundations for Cost Analysis of Pipeline-Optimized Programs.
Proceedings of the Static Analysis - 29th International Symposium, 2022

Improving Software Quality in Cryptography Standardization Projects.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Post Quantum Noise.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021

SCA-secure ECC in software - mission impossible?
IACR Cryptol. ePrint Arch., 2021

Post-quantum WireGuard.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

High-Assurance Cryptography in the Spectre Era.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys.
Proceedings of the Computer Security - ESORICS 2021, 2021

A Coq proof of the correctness of X25519 in TweetNaCl.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
High-Assurance Cryptography Software in the Spectre Era.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum TLS Without Handshake Signatures.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Solving binary MQ with Grover's algorithm.
IACR Cryptol. ePrint Arch., 2019

pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2019

The SPHINCS+ Signature Framework.
IACR Cryptol. ePrint Arch., 2019

The Complete Cost of Cofactor h=1.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

The SPHINCS<sup>+</sup> Signature Framework.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC Candidates.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Faster multiplication in ℤ<sub>2<sup>m</sup></sub>[x] on Cortex-M4 to speed up NIST PQC candidates.
IACR Cryptol. ePrint Arch., 2018

SOFIA: <i>MQ</i> MQ -Based Signatures in the QROM.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Is Java Card Ready for Hash-Based Signatures?
Proceedings of the Advances in Information and Computer Security, 2018

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Vectorizing Higher-Order Masking.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
CRYSTALS - Dilithium: Digital Signatures from Module Lattices.
IACR Cryptol. ePrint Arch., 2017

SOFIA: MQ-based signatures in the QROM.
IACR Cryptol. ePrint Arch., 2017

CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM.
IACR Cryptol. ePrint Arch., 2017

High-Speed Key Encapsulation from NTRU.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Gimli : A Cross-Platform Permutation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
From 5-pass MQ-based identification to MQ-based signatures.
IACR Cryptol. ePrint Arch., 2016

Faster discrete logarithms on FPGAs.
IACR Cryptol. ePrint Arch., 2016

A new hope on ARM Cortex-M.
IACR Cryptol. ePrint Arch., 2016

NewHope without reconciliation.
IACR Cryptol. ePrint Arch., 2016

$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers.
CoRR, 2016

Post-quantum Key Exchange - A New Hope.
Proceedings of the 25th USENIX Security Symposium, 2016

Solving Binary <i>MQ</i> with Grover's Algorithm.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

NewHope on ARM Cortex-M.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

All the AES You Need on Cortex-M3 and M4.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Attacking Embedded ECC Implementations Through cmov Side Channels.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Footprint Scheduling for Dining-Cryptographer Networks.
Proceedings of the Financial Cryptography and Data Security, 2016

\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

From 5-Pass <i>MQ</i> -Based Identification to <i>MQ</i> -Based Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Multiprecision multiplication on AVR revisited.
J. Cryptogr. Eng., 2015

ARMed SPHINCS - Computing a 41KB signature in 16KB of RAM.
IACR Cryptol. ePrint Arch., 2015

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers.
IACR Cryptol. ePrint Arch., 2015

EdDSA for more curves.
IACR Cryptol. ePrint Arch., 2015

SPHINCS: Practical Stateless Hash-Based Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

NaCl's Crypto_box in Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
SPHINCS: practical stateless hash-based signatures.
IACR Cryptol. ePrint Arch., 2014

Full-Size High-Security ECC Implementation on MSP430 Microcontrollers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

High-Speed Signatures from Standard Lattices.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

TweetNaCl: A Crypto Library in 100 Tweets.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Online Template Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Verifying Curve25519 Software.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Kummer Strikes Back: New DH Speed Records.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Graphics Processing Units.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Software Speed Records for Lattice-Based Signatures.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

PandA: Pairings and Arithmetic.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

McBits: Fast Constant-Time Code-Based Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

NaCl on 8-Bit AVR Microcontrollers.
Proceedings of the Progress in Cryptology, 2013

2012
Usable assembly language for GPUs: a success story.
IACR Cryptol. ePrint Arch., 2012

The Security Impact of a New Cryptographic Library.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

NEON Crypto.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

SHA-3 on ARM11 Processors.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
On the Correct Use of the Negation Map in the Pollard rho Method.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Faster 2-Regular Information-Set Decoding.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

High-Speed High-Security Signatures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Really Fast Syndrome-Based Hashing.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
New Software Speed Records for Cryptographic Pairings.
Proceedings of the Progress in Cryptology, 2010

ECC2K-130 on NVIDIA GPUs.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

ECC2K-130 on Cell CPUs.
Proceedings of the Progress in Cryptology, 2010

2009
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves.
IACR Cryptol. ePrint Arch., 2009

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009

Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

The Certicom Challenges ECC2-X.
IACR Cryptol. ePrint Arch., 2009

FSBday.
Proceedings of the Progress in Cryptology, 2009

Faster and Timing-Attack Resistant AES-GCM.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Fast Elliptic-Curve Cryptography on the Cell Broadband Engine.
Proceedings of the Progress in Cryptology, 2009

2008
New AES Software Speed Records.
Proceedings of the Progress in Cryptology, 2008

On Compressible Pairings and Their Computation.
Proceedings of the Progress in Cryptology, 2008


  Loading...