Name
Papers
Collaborators
TANJA LANGE
77
106
Citations 
PageRank 
Referers 
1170
71.41
1846
Referees 
References 
959
755
Search Limit
1001000
Title
Citations
PageRank
Year
Disorientation faults in CSIDH.00.342022
Concrete quantum cryptanalysis of binary elliptic curves.00.342021
Non-randomness of S-unit lattices.00.342021
CTIDH: faster constant-time CSIDH.00.342021
Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions.00.342021
Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers00.342019
CSIDH: An Efficient Post-Quantum Commutative Group Action.50.432018
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction.20.372018
Montgomery curves and the Montgomery ladder.00.342017
Double-base scalar multiplication revisited.20.372017
Post-quantum cryptography - dealing with the fallout of physics success.10.352017
Sliding Right Into Disaster: Left-To-Right Sliding Windows Leak40.412017
(In-)Secure messaging with the Silent Circle instant messaging protocol.00.342016
NTRU Prime.00.342016
Faster discrete logarithms on FPGAs.10.342016
EdDSA for more curves.30.442015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.20.382015
Dual EC : a standardized back door50.412015
Bad Directions In Cryptographic Hash Functions40.382015
Twisted Hessian curves.00.342015
Tighter, faster, simpler side-channel security evaluations beyond computing power.140.712015
Tweetnacl: A Crypto Library In 100 Tweets110.582014
Hyper-and-elliptic-curve cryptography.20.382014
On the practical exploitability of dual EC in TLS implementations50.822014
Kummer Strikes Back: New DH Speed Records.190.872014
SPHINCS: Practical Stateless Hash-Based Signatures.492.042014
How to manipulate curve standards: a white paper for the black hat.20.412014
Kangaroos in Side-Channel Attacks.70.552014
Batch NFS.00.342014
Curve41417: Karatsuba Revisited40.432014
Quantum Algorithms For The Subset-Sum Problem100.512013
MinimaLT: minimal-latency networking through better security190.982013
Elligator: elliptic-curve points indistinguishable from uniform random strings391.912013
Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers200.852013
ECM using Edwards curves.40.412013
Factoring RSA keys from certified smart cards: Coppersmith in the wild.70.502013
Two grumpy giants and a baby.70.602012
Never trust a bunny70.472012
Usable assembly language for GPUs: a success story.10.372012
The security impact of a new cryptographic library572.662012
The new SHA-3 software shootout.20.422012
Computing small discrete logarithms faster.90.572012
Non-uniform cracks in the concrete: the power of free precomputation.271.182012
Faster batch forgery identification.60.512012
Ecc2k-130 On Nvidia Gpus60.452012
Wild mceliece incognito30.412011
Faster 2-regular information-set decoding60.512011
Really fast syndrome-based hashing80.452011
On the correct use of the negation map in the Pollard rho method210.962011
High-speed high-security signatures943.502011
  • 1
  • 2