Links to dblp and Google scholar.

PhD Thesis
Security on the Line: Modern Curve-based Cryptography
defended 1 July 2019 [pdf]
Conference Proceedings
  • Polynomial Multiplication with Contemporary Co-processors
    w/ Joppe Bos and Christine van Vredendaal
    USENIX Security 2022 [pdf] [bib]
  • The Matrix Reloaded: Multiplication Strategies in FrodoKEM
    w/ Joppe Bos, Maximilian Ofner, Tobias Schneider and Christine van Vredendaal
    CANS 2021 [pdf] [bib]
  • Masking Kyber: First- and Higher-Order Implementations
    w/ Joppe Bos, Marc Gourjon, Tobias Schneider and Christine van Vredendaal
    TCHES 2021 [pdf] [bib]
  • Cyber Resilience for Self-Monitoring IoT Devices
    w/ Marcel Medwed, Ventzi Nikov, Tobias Schneider and Nikita Veshchikov
    IEEE Cyber Security and Resilience 2021
    Winner of the Best Industrial Paper Award
  • Rapidly Verifiable XMSS Signatures
    w/ Joppe Bos, Andreas Hülsing and Christine van Vredendaal
    TCHES 2021 [pdf] [bib]
  • Improved Classical Cryptanalysis of SIKE in Practice
    w/ Craig Costello, Patrick Longa, Michael Naehrig and Fernando Virdia
    PKC 2020 [pdf] [bib]
  • A Compact and Scalable Hardware/Software Co-design of SIKE
    w/ Pedro Maat C. Massolino, Patrick Longa and Lejla Batina
    TCHES 2020 [pdf] [bib]
  • Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
    w/ Michael Naehrig
    Asiacrypt 2019 [pdf] [bib]
  • CSIDH: An Efficient Post-Quantum Commutative Group Action
    w/ Wouter Castryck, Tanja Lange, Chloe Martindale and Lorenz Panny
    Asiacrypt 2018 [pdf] [bib]
    Winner of the Dutch Cyber Security Research Paper (DCSRP) best paper Award 2019
  • Computing Isogenies between Montgomery Curves Using the Action of (0,0)
    PQCrypto 2018 [pdf] [bib]
  • qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
    w/ Benjamin Smith
    Asiacrypt 2017 [pdf] [bib]
  • Efficient compression of SIDH public keys
    w/ Craig Costello, David Jao, Patrick Longa, Michael Naehrig and David Urbanik
    Eurocrypt 2017 [pdf] [bib]
  • Implementing Complete Formulas on Weierstrass Curves in Hardware
    w/ Pedro Maat C. Massolino and Lejla Batina
    SPACE 2016 [pdf] [bib]
  • μKummer: efficient hyperelliptic signatures and key exchange on microcontrollers
    w/ Peter Schwabe, Benjamin Smith and Lejla Batina
    CHES 2016 [pdf] [bib]
  • Complete addition formulas for prime order elliptic curves
    w/ Craig Costello and Lejla Batina
    Eurocrypt 2016 [pdf] [bib]
    Nominated for the Dutch Cyber Security Research Paper (DCSRP) best paper Award 2017
Journal Publications
  • On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
    w/ Huseyin Hisil
    ACM Transactions on Mathematical Software (2019) [pdf] [bib]
  • SIKE - Supersingular Isogeny Key Encapsulation
    submission to NIST for PQC Standardization with many co-authors
    [rd1, rd2] [website]