Ruben Niederhagen

According to our database1, Ruben Niederhagen authored at least 40 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2020
ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Post-Quantum TLS on Embedded Systems.
IACR Cryptol. ePrint Arch., 2020

ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

Post-Quantum Secure Boot.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Side Channel Information Set Decoding.
IACR Cryptol. ePrint Arch., 2019

The SPHINCS+ Signature Framework.
IACR Cryptol. ePrint Arch., 2019

XMSS and Embedded Systems.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Quotable Signatures using Merkle Trees.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

The SPHINCS<sup>+</sup> Signature Framework.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V.
IACR Cryptol. ePrint Arch., 2018

Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

2017
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes.
IACR Cryptol. ePrint Arch., 2017

FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes.
IACR Cryptol. ePrint Arch., 2017

Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs.
IACR Cryptol. ePrint Arch., 2017

2016
Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptol. ePrint Arch., 2016

Faster discrete logarithms on FPGAs.
IACR Cryptol. ePrint Arch., 2016

Solving large systems of linear equations over GF(2) on FPGAs.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016

2015
Dual EC: A Standardized Back Door.
IACR Cryptol. ePrint Arch., 2015

Bad directions in cryptographic hash functions.
IACR Cryptol. ePrint Arch., 2015

Investigating SRAM PUFs in large CPUs and GPUs.
IACR Cryptol. ePrint Arch., 2015

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

SPHINCS: Practical Stateless Hash-Based Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
SPHINCS: practical stateless hash-based signatures.
IACR Cryptol. ePrint Arch., 2014

How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

On the Practical Exploitability of Dual EC in TLS Implementations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Usable assembly language for GPUs: a success story.
IACR Cryptol. ePrint Arch., 2012

ECC2K-130 on NVIDIA GPUs.
IACR Cryptol. ePrint Arch., 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2010
New software speed records for cryptographic pairings.
IACR Cryptol. ePrint Arch., 2010

Fast Exhaustive Search for Polynomial Systems in F<sub>2</sub>.
IACR Cryptol. ePrint Arch., 2010

ECC2K-130 on Cell CPUs.
IACR Cryptol. ePrint Arch., 2010

Fast Exhaustive Search for Polynomial Systems in <i>F</i><sub>2</sub>.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009

Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

FSBday.
Proceedings of the Progress in Cryptology, 2009


  Loading...