Tanja Lange
Affiliations:- Technische Universiteit Eindhoven, NL
According to our database1,
Tanja Lange
authored at least 136 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the Cryptology and Network Security - 24th International Conference, 2025
Proceedings of the Information Security in a Connected World, 2025
2024
2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Addition formulas for elliptic curves.
Proceedings of the Handbook of Finite Fields., 2013
2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the Progress in Cryptology, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006
2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Collisions in Fast Generation of Ideal Classes and Points on Hyperelliptic and Elliptic Curves.
Appl. Algebra Eng. Commun. Comput., 2005
Appl. Algebra Eng. Commun. Comput., 2005
On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two.
Proceedings of the Coding and Cryptography, International Workshop, 2005
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2.
Proceedings of the Progress in Cryptology, 2005
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004
2003
Linear Complexity of the Discrete Logarithm.
Des. Codes Cryptogr., 2003
Interpolation of the Discrete Logarithm in F<sub>q</sub> by Boolean Functions and by Polynomials in Several Variables Modulo a Divisor of Q-1.
Discret. Appl. Math., 2003
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Applied Algebra, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae.
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
2001
Electron. Notes Discret. Math., 2001
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000