Ruben Niederhagen
According to our database1,
Ruben Niederhagen
authored at least 48 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
2023
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Progress in Cryptology, 2022
2020
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V.
IACR Cryptol. ePrint Arch., 2020
Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018
2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016
2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009