Security on the Line: Modern Curve-based Cryptography
defended 1 July 2019
[pdf]
Conference Proceedings
Dilithium for Memory Constrained Devices
w/ Joppe Bos and Amber Sprenkels
Africacrypt 2022
[pdf]
[bib]
Post-Quantum Secure Boot on Vehicle Network Processors
Joppe W. Bos, Brian Carlson, Marius Rotaru, Amber Sprenkels and Geoffrey P. Waters
Escar 2022
[pdf]
[bib]
Polynomial Multiplication with Contemporary Co-processors
w/ Joppe Bos and Christine van Vredendaal
USENIX Security 2022
[pdf]
[bib]
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
w/ Joppe Bos, Maximilian Ofner, Tobias Schneider and Christine van Vredendaal
CANS 2021
[pdf]
[bib]
Masking Kyber: First- and Higher-Order Implementations
w/ Joppe Bos, Marc Gourjon, Tobias Schneider and Christine van Vredendaal
TCHES 2021
[pdf]
[bib]
Cyber Resilience for Self-Monitoring IoT Devices
w/ Marcel Medwed, Ventzi Nikov, Tobias Schneider and Nikita Veshchikov
IEEE Cyber Security and Resilience 2021
Winner of the Best Industrial Paper Award
Rapidly Verifiable XMSS Signatures
w/ Joppe Bos, Andreas Hülsing and Christine van Vredendaal
TCHES 2021
[pdf]
[bib]
Improved Classical Cryptanalysis of SIKE in Practice
w/ Craig Costello, Patrick Longa, Michael Naehrig and Fernando Virdia
PKC 2020
[pdf]
[bib]
A Compact and Scalable Hardware/Software
Co-design of SIKE
w/ Pedro Maat C. Massolino, Patrick Longa and Lejla Batina
TCHES 2020
[pdf]
[bib]
Dual Isogenies and Their Application
to Public-key Compression for Isogeny-based
Cryptography
w/ Michael Naehrig
Asiacrypt 2019
[pdf]
[bib]
CSIDH: An Efficient Post-Quantum Commutative Group Action
w/ Wouter Castryck, Tanja Lange, Chloe Martindale and Lorenz Panny
Asiacrypt 2018
[pdf]
[bib]
Winner of the Dutch Cyber Security Research Paper
(DCSRP)
best paper Award 2019
Computing Isogenies between Montgomery Curves
Using the Action of (0,0)
qDSA: Small and Secure Digital Signatures with
Curve-based Diffie-Hellman Key Pairs
w/ Benjamin Smith
Asiacrypt 2017
[pdf]
[bib]
Efficient compression of SIDH public keys
w/ Craig Costello, David Jao, Patrick Longa, Michael Naehrig and David Urbanik
Eurocrypt 2017
[pdf]
[bib]
Implementing Complete Formulas on Weierstrass Curves in Hardware
w/ Pedro Maat C. Massolino and Lejla Batina
SPACE 2016
[pdf]
[bib]
μKummer: efficient hyperelliptic signatures and key exchange on microcontrollers
w/ Peter Schwabe, Benjamin Smith and Lejla Batina
CHES 2016
[pdf]
[bib]
Complete addition formulas for prime order elliptic curves
w/ Craig Costello and Lejla Batina
Eurocrypt 2016
[pdf]
[bib]
Nominated for the Dutch Cyber Security Research Paper
(DCSRP)
best paper Award 2017
Journal Publications
Cyber Resilience for the Internet of Things: Implementations with Resilience Engines and Attack Classifications
w/ Eduardo Alvarenga, Jan R Brands, Peter Doliwa, Jerry den Hartog, Erik Kraft, Marcel Medwed, Ventzislav Nikov, Martin Rosso, Tobias Schneider, Nikita Veshchikov
IEEE Transactions on Emerging Topics in Computing 2023
[bib]
On Kummer Lines With Full Rational 2-torsion
and Their Usage in Cryptography
w/ Huseyin Hisil
ACM Transactions on Mathematical Software (2019)
[pdf]
[bib]
Preprints
Enabling FrodoKEM on Embedded Devices
w/ Joppe W. Bos, Olivier Bronchain, Frank Custers, Denise Verbakel and Christine van Vredendaal
IACR ePrint
[pdf]
[bib]
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations
w/ Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Markus Schönauer, Tobias Schneider, François-Xavier Standaert and Christine van Vredendaal
IACR ePrint
[pdf]
[bib]
Others
SIKE - Supersingular Isogeny Key Encapsulation
submission to NIST for PQC Standardization
with many co-authors
[rd1,
rd2]
[website]