Tanja Lange

Affiliations:
  • Technische Universiteit Eindhoven, NL


According to our database1, Tanja Lange authored at least 136 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
PQConnect: Automated Post-Quantum End-to-End Tunnels.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

A Key-Update Mechanism for the Space Data Link Security Protocol.
Proceedings of the Cryptology and Network Security - 24th International Conference, 2025

Safe curves for elliptic-curve cryptography.
Proceedings of the Information Security in a Connected World, 2025

2024
Analysis of Layered ROLLO-I.
IACR Cryptol. ePrint Arch., 2024

Searching for differential addition chains.
IACR Cryptol. ePrint Arch., 2024

Report on evaluation of KpqC Round-2 candidates.
IACR Cryptol. ePrint Arch., 2024

Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM.
IACR Commun. Cryptol., 2024

2023
Report on evaluation of KpqC candidates.
IACR Cryptol. ePrint Arch., 2023

On the security of REDOG.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Disorientation Faults in CSIDH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Concrete Analysis of Quantum Lattice Enumeration.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2021
Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions.
IACR Cryptol. ePrint Arch., 2021

Non-randomness of S-unit lattices.
IACR Cryptol. ePrint Arch., 2021

CTIDH: faster constant-time CSIDH.
IACR Cryptol. ePrint Arch., 2021

Verifying Post-Quantum Signatures in 8 kB of RAM.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
Concrete quantum cryptanalysis of binary elliptic curves.
IACR Cryptol. ePrint Arch., 2020

McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

CSIDH: An Efficient Post-Quantum Commutative Group Action.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Post-quantum cryptography.
Nat., 2017

Post-quantum cryptography - dealing with the fallout of physics success.
IACR Cryptol. ePrint Arch., 2017

Montgomery curves and the Montgomery ladder.
IACR Cryptol. ePrint Arch., 2017

Double-base scalar multiplication revisited.
IACR Cryptol. ePrint Arch., 2017

Lattice Klepto - Turning Post-Quantum Crypto Against Itself.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

NTRU Prime: Reducing Attack Surface at Low Cost.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Short Generators Without Quantum Computers: The Case of Multiquadratics.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
(In-)Secure messaging with the Silent Circle instant messaging protocol.
IACR Cryptol. ePrint Arch., 2016

Faster discrete logarithms on FPGAs.
IACR Cryptol. ePrint Arch., 2016

NTRU Prime.
IACR Cryptol. ePrint Arch., 2016

Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Dual EC: A Standardized Back Door.
Proceedings of the New Codebreakers, 2016

2015
Tighter, faster, simpler side-channel security evaluations beyond computing power.
IACR Cryptol. ePrint Arch., 2015

EdDSA for more curves.
IACR Cryptol. ePrint Arch., 2015

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Twisted Hessian Curves.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

SPHINCS: Practical Stateless Hash-Based Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Bad Directions in Cryptographic Hash Functions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Hyper-and-elliptic-curve cryptography.
LMS J. Comput. Math., 2014

SPHINCS: practical stateless hash-based signatures.
IACR Cryptol. ePrint Arch., 2014

How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

On the Practical Exploitability of Dual EC in TLS Implementations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Batch NFS.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

TweetNaCl: A Crypto Library in 100 Tweets.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Curve41417: Karatsuba Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Kangaroos in Side-Channel Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Kummer Strikes Back: New DH Speed Records.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
ECM using Edwards curves.
Math. Comput., 2013

Elligator: Elliptic-curve points indistinguishable from uniform random strings.
IACR Cryptol. ePrint Arch., 2013

Quantum Algorithms for the Subset-Sum Problem.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

MinimaLT: minimal-latency networking through better security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Elligator: elliptic-curve points indistinguishable from uniform random strings.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Non-uniform Cracks in the Concrete: The Power of Free Precomputation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Addition formulas for elliptic curves.
Proceedings of the Handbook of Finite Fields., 2013

2012
Two grumpy giants and a baby.
IACR Cryptol. ePrint Arch., 2012

The new SHA-3 software shootout.
IACR Cryptol. ePrint Arch., 2012

Usable assembly language for GPUs: a success story.
IACR Cryptol. ePrint Arch., 2012

Never Trust a Bunny.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

The Security Impact of a New Cryptographic Library.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Computing Small Discrete Logarithms Faster.
Proceedings of the Progress in Cryptology, 2012

Faster Batch Forgery Identification.
Proceedings of the Progress in Cryptology, 2012

2011
Vector Space.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Pairing-Based Key Exchange.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hash-Based Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Edwards Curves.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Wild McEliece Incognito.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

On the Correct Use of the Negation Map in the Pollard rho Method.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Elliptic Curves for Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Smaller Decoding Exponents: Ball-Collision Decoding.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Faster 2-Regular Information-Set Decoding.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

High-Speed High-Security Signatures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Really Fast Syndrome-Based Hashing.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Cryptanalysis of Skein.
IACR Cryptol. ePrint Arch., 2010

Type-II Optimal Polynomial Bases.
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010

Wild McEliece.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Faster Pairing Computations on Curves with High-Degree Twists.
Proceedings of the Public Key Cryptography, 2010

Starfish on Strike.
Proceedings of the Progress in Cryptology, 2010

ECC2K-130 on NVIDIA GPUs.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009

A complete set of addition laws for incomplete Edwards curves.
IACR Cryptol. ePrint Arch., 2009

Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

The Certicom Challenges ECC2-X.
IACR Cryptol. ePrint Arch., 2009

Faster Computation of the Tate Pairing.
IACR Cryptol. ePrint Arch., 2009

FSBday.
Proceedings of the Progress in Cryptology, 2009

ECM on Graphics Cards.
Proceedings of the Advances in Cryptology, 2009

2008
Attacking and Defending the McEliece Cryptosystem.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Revisiting Pairing Based Group Key Exchange.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Binary Edwards Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Twisted Edwards Curves.
Proceedings of the Progress in Cryptology, 2008

2007
Distribution of some sequences of points on elliptic curves.
J. Math. Cryptol., 2007

Analysis and optimization of elliptic-curve single-scalar multiplication.
IACR Cryptol. ePrint Arch., 2007

Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication.
Proceedings of the Progress in Cryptology, 2007

Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.
Proceedings of the Financial Cryptography and Data Security, 2007

Faster Addition and Doubling on Elliptic Curves.
Proceedings of the Advances in Cryptology, 2007

Inverted Edwards Coordinates.
Proceedings of the Applied Algebra, 2007

2006
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng.
Proceedings of the Financial Cryptography and Data Security, 2006

Fast Bilinear Maps from the Tate-Lichtenbaum Pairing on Hyperelliptic Curves.
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

2005
Random Numbers Generation and Testing.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Mathematical Countermeasures against Side-Channel Attacks.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Algebraic Realizations of DL Systems.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Transfer of Discrete Logarithms.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Complex Multiplication.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Background on Weil Descent.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Varieties over Special Fields.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Background on Curves and Jacobians.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Pairing-Based Cryptography.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Arithmetic of Hyperelliptic Curves.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Arithmetic of Special Curves.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Arithmetic of Elliptic Curves.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Introduction to Public-Key Cryptography.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Koblitz curve cryptosystems.
Finite Fields Their Appl., 2005

Collisions in Fast Generation of Ideal Classes and Points on Hyperelliptic and Elliptic Curves.
Appl. Algebra Eng. Commun. Comput., 2005

Formulae for Arithmetic on Genus 2 Hyperelliptic Curves.
Appl. Algebra Eng. Commun. Comput., 2005

On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two.
Proceedings of the Coding and Cryptography, International Workshop, 2005

SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2.
Proceedings of the Progress in Cryptology, 2005

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Proceedings of the Advances in Cryptology, 2005

2004
On using expansions to the base of -2.
Int. J. Comput. Math., 2004

A note on López-Dahab coordinates.
IACR Cryptol. ePrint Arch., 2004

Efficient Doubling on Genus Two Curves over Binary Fields.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Montgomery Addition for Genus Two Curves.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
Trace Zero Subvariety for Cryptosystems.
IACR Cryptol. ePrint Arch., 2003

Linear Complexity of the Discrete Logarithm.
Des. Codes Cryptogr., 2003

Interpolation of the Discrete Logarithm in F<sub>q</sub> by Boolean Functions and by Polynomials in Several Variables Modulo a Divisor of Q-1.
Discret. Appl. Math., 2003

Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Proceedings of the Advances in Cryptology, 2003

Interpolation of the Elliptic Curve Diffie-Hellman Mapping.
Proceedings of the Applied Algebra, 2003

2002
Weighted Coordinates on Genus 2 Hyperelliptic Curves.
IACR Cryptol. ePrint Arch., 2002

Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves.
IACR Cryptol. ePrint Arch., 2002

Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae.
IACR Cryptol. ePrint Arch., 2002

Efficient Arithmetic on Hyperelliptic Curves.
IACR Cryptol. ePrint Arch., 2002

Polynomial Interpolation of the Elliptic Curve and XTR Discrete Logarithm.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

2001
Interpolation of the Discrete Logarithm in Finite Fields by Boolean Functions.
Electron. Notes Discret. Math., 2001

2000
Factoring polynomials over arbitrary finite fields.
Theor. Comput. Sci., 2000

Speeding up the Arithmetic on Koblitz Curves of Genus Two.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000


  Loading...