Ruben Niederhagen

According to our database1, Ruben Niederhagen authored at least 47 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reducing Signature Size of Matrix-code-based Signature Schemes.
IACR Cryptol. ePrint Arch., 2024

2023
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging.
IACR Cryptol. ePrint Arch., 2023

Quotable Signatures for Authenticating Shared Quotes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

2022
Complete and Improved FPGA Implementation of Classic McEliece.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Take your MEDS: Digital Signatures from Matrix Code Equivalence.
IACR Cryptol. ePrint Arch., 2022

2021
Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3.
IACR Cryptol. ePrint Arch., 2021

Streaming SPHINCS+ for Embedded Devices using the Example of TPMs.
IACR Cryptol. ePrint Arch., 2021

2020
ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Post-Quantum TLS on Embedded Systems.
IACR Cryptol. ePrint Arch., 2020

ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

Post-Quantum Secure Boot.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Side Channel Information Set Decoding.
IACR Cryptol. ePrint Arch., 2019

The SPHINCS+ Signature Framework.
IACR Cryptol. ePrint Arch., 2019

XMSS and Embedded Systems.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Quotable Signatures using Merkle Trees.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

The SPHINCS<sup>+</sup> Signature Framework.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V.
IACR Cryptol. ePrint Arch., 2018

Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

2017
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes.
IACR Cryptol. ePrint Arch., 2017

FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes.
IACR Cryptol. ePrint Arch., 2017

Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs.
IACR Cryptol. ePrint Arch., 2017

2016
Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptol. ePrint Arch., 2016

Faster discrete logarithms on FPGAs.
IACR Cryptol. ePrint Arch., 2016

Solving large systems of linear equations over GF(2) on FPGAs.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016

2015
Dual EC: A Standardized Back Door.
IACR Cryptol. ePrint Arch., 2015

Bad directions in cryptographic hash functions.
IACR Cryptol. ePrint Arch., 2015

Investigating SRAM PUFs in large CPUs and GPUs.
IACR Cryptol. ePrint Arch., 2015

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

SPHINCS: Practical Stateless Hash-Based Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
SPHINCS: practical stateless hash-based signatures.
IACR Cryptol. ePrint Arch., 2014

How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

On the Practical Exploitability of Dual EC in TLS Implementations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Usable assembly language for GPUs: a success story.
IACR Cryptol. ePrint Arch., 2012

ECC2K-130 on NVIDIA GPUs.
IACR Cryptol. ePrint Arch., 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2010
New software speed records for cryptographic pairings.
IACR Cryptol. ePrint Arch., 2010

Fast Exhaustive Search for Polynomial Systems in F<sub>2</sub>.
IACR Cryptol. ePrint Arch., 2010

ECC2K-130 on Cell CPUs.
IACR Cryptol. ePrint Arch., 2010

Fast Exhaustive Search for Polynomial Systems in <i>F</i><sub>2</sub>.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009

Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

FSBday.
Proceedings of the Progress in Cryptology, 2009


  Loading...