Tanja Lange
Affiliations:- Technische Universiteit Eindhoven, NL
According to our database1,
Tanja Lange
authored at least 133 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Addition formulas for elliptic curves.
Proceedings of the Handbook of Finite Fields., 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
2009
IACR Cryptol. ePrint Arch., 2009
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2008
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptol., 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006
2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005
Collisions in Fast Generation of Ideal Classes and Points on Hyperelliptic and Elliptic Curves.
Appl. Algebra Eng. Commun. Comput., 2005
Appl. Algebra Eng. Commun. Comput., 2005
On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two.
Proceedings of the Coding and Cryptography, International Workshop, 2005
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2.
Proceedings of the Progress in Cryptology, 2005
2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004
2003
Linear Complexity of the Discrete Logarithm.
Des. Codes Cryptogr., 2003
Interpolation of the Discrete Logarithm in F<sub>q</sub> by Boolean Functions and by Polynomials in Several Variables Modulo a Divisor of Q-1.
Discret. Appl. Math., 2003
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Applied Algebra, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae.
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
2001
Electron. Notes Discret. Math., 2001
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000