What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tanja Lange
Google Scholar
49
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
PQConnect: Automated Post-Quantum End-to-End Tunnels.
Daniel J. Bernstein
Tanja Lange
Jonathan Levin
Bo-Yin Yang
2024
journals/cic
Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM.
Seongtaek Chee
Kyung Chul Jeong
Tanja Lange
Nari Lee
Alex Pellegrini
Hansol Ryu
2023
conf/icisc
On the security of REDOG.
Tanja Lange
Alex Pellegrini
Alberto Ravagnani
2023
conf/eurocrypt
Disorientation Faults in CSIDH.
Gustavo Banegas
Juliane Krämer
Tanja Lange
Michael Meyer
Lorenz Panny
Krijn Reijnders
Jana Sotáková
Monika Trimoska
2023
conf/asiacrypt
Concrete Analysis of Quantum Lattice Enumeration.
Shi Bai
Maya-Iggy van Hoof
Floyd Johnson
Tanja Lange
Tran Ngo
2021
journals/tches
CTIDH: faster constant-time CSIDH.
Gustavo Banegas
Daniel J. Bernstein
Fabio Campos
Tung Chou
Tanja Lange
Michael Meyer
Benjamin Smith
Jana Sotáková
2021
journals/tches
Concrete quantum cryptanalysis of binary elliptic curves.
Gustavo Banegas
Daniel J. Bernstein
Iggy van Hoof
Tanja Lange
2020
conf/uss
McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.
Daniel J. Bernstein
Tanja Lange
2019
conf/eurocrypt
Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
Daniel J. Bernstein
Tanja Lange
Chloe Martindale
Lorenz Panny
2018
conf/pkc
Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto.
Andreas Hülsing
Tanja Lange
Kit Smeets
2018
conf/asiacrypt
CSIDH: An Efficient Post-Quantum Commutative Group Action.
Wouter Castryck
Tanja Lange
Chloe Martindale
Lorenz Panny
Joost Renes
2018
conf/africacrypt
HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction.
Daniel J. Bernstein
Leon Groot Bruinderink
Tanja Lange
Lorenz Panny
2017
conf/ches
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Daniel J. Bernstein
Joachim Breitner
Daniel Genkin
Leon Groot Bruinderink
Nadia Heninger
Tanja Lange
Christine van Vredendaal
Yuval Yarom
2017
conf/eurocrypt
Short Generators Without Quantum Computers: The Case of Multiquadratics.
Jens Bauch
Daniel J. Bernstein
Henry de Valence
Tanja Lange
Christine van Vredendaal
2017
conf/sacrypt
Lattice Klepto - Turning Post-Quantum Crypto Against Itself.
Robin Kwant
Tanja Lange
Kimberley Thissen
2017
conf/sacrypt
NTRU Prime: Reducing Attack Surface at Low Cost.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
Tanja Lange
Christine van Vredendaal
2016
conf/ches
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
Leon Groot Bruinderink
Andreas Hülsing
Tanja Lange
Yuval Yarom
2015
conf/latincrypt
Twisted Hessian Curves.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
David Kohel
Tanja Lange
2015
conf/acisp
Bad Directions in Cryptographic Hash Functions.
Daniel J. Bernstein
Andreas Hülsing
Tanja Lange
Ruben Niederhagen
2015
conf/eurocrypt
SPHINCS: Practical Stateless Hash-Based Signatures.
Daniel J. Bernstein
Daira Hopwood
Andreas Hülsing
Tanja Lange
Ruben Niederhagen
Louiza Papachristodoulou
Michael Schneider
Peter Schwabe
Zooko Wilcox-O'Hearn
2014
conf/latincrypt
TweetNaCl: A Crypto Library in 100 Tweets.
Daniel J. Bernstein
Bernard van Gastel
Wesley Janssen
Tanja Lange
Peter Schwabe
Sjaak Smetsers
2014
conf/uss
On the Practical Exploitability of Dual EC in TLS Implementations.
Stephen Checkoway
Ruben Niederhagen
Adam Everspaugh
Matthew Green
Tanja Lange
Thomas Ristenpart
Daniel J. Bernstein
Jake Maskiewicz
Hovav Shacham
Matthew Fredrikson
2014
conf/ches
Curve41417: Karatsuba Revisited.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
Tanja Lange
2014
conf/asiacrypt
Kummer Strikes Back: New DH Speed Records.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
Tanja Lange
Peter Schwabe
2014
conf/sacrypt
Batch NFS.
Daniel J. Bernstein
Tanja Lange
2013
conf/ccs
MinimaLT: minimal-latency networking through better security.
W. Michael Petullo
Xu Zhang
Jon A. Solworth
Daniel J. Bernstein
Tanja Lange
2013
conf/ccs
Elligator: elliptic-curve points indistinguishable from uniform random strings.
Daniel J. Bernstein
Mike Hamburg
Anna Krasnova
Tanja Lange
2013
conf/asiacrypt
Non-uniform Cracks in the Concrete: The Power of Free Precomputation.
Daniel J. Bernstein
Tanja Lange
2013
conf/asiacrypt
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild.
Daniel J. Bernstein
Yun-An Chang
Chen-Mou Cheng
Li-Ping Chou
Nadia Heninger
Tanja Lange
Nicko van Someren
2012
conf/latincrypt
The Security Impact of a New Cryptographic Library.
Daniel J. Bernstein
Tanja Lange
Peter Schwabe
2011
conf/crypto
Smaller Decoding Exponents: Ball-Collision Decoding.
Daniel J. Bernstein
Tanja Lange
Christiane Peters
2011
conf/ches
High-Speed High-Security Signatures.
Daniel J. Bernstein
Niels Duif
Tanja Lange
Peter Schwabe
Bo-Yin Yang
2011
conf/pkc
On the Correct Use of the Negation Map in the Pollard rho Method.
Daniel J. Bernstein
Tanja Lange
Peter Schwabe
2011
conf/africacrypt
Really Fast Syndrome-Based Hashing.
Daniel J. Bernstein
Tanja Lange
Christiane Peters
Peter Schwabe
2010
conf/latincrypt
Starfish on Strike.
Daniel J. Bernstein
Peter Birkner
Tanja Lange
2010
conf/pkc
Faster Pairing Computations on Curves with High-Degree Twists.
Craig Costello
Tanja Lange
Michael Naehrig
2010
conf/sacrypt
Wild McEliece.
Daniel J. Bernstein
Tanja Lange
Christiane Peters
2009
conf/eurocrypt
ECM on Graphics Cards.
Daniel J. Bernstein
Tien-Ren Chen
Chen-Mou Cheng
Tanja Lange
Bo-Yin Yang
2008
journals/joc
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2008
conf/fc
Revisiting Pairing Based Group Key Exchange.
Yvo Desmedt
Tanja Lange
2008
conf/ches
Binary Edwards Curves.
Daniel J. Bernstein
Tanja Lange
Reza Rezaeian Farashahi
2008
conf/africacrypt
Twisted Edwards Curves.
Daniel J. Bernstein
Peter Birkner
Marc Joye
Tanja Lange
Christiane Peters
2007
conf/fc
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.
Yvo Desmedt
Tanja Lange
Mike Burmester
2007
conf/asiacrypt
Faster Addition and Doubling on Elliptic Curves.
Daniel J. Bernstein
Tanja Lange
2006
conf/fc
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng.
Yvo Desmedt
Tanja Lange
2005
conf/crypto
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2004
conf/sacrypt
Efficient Doubling on Genus Two Curves over Binary Fields.
Tanja Lange
Marc Stevens
2003
conf/eurocrypt
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Mathieu Ciet
Tanja Lange
Francesco Sica
Jean-Jacques Quisquater
2000
conf/sacrypt
Speeding up the Arithmetic on Koblitz Curves of Genus Two.
Christian Günther
Tanja Lange
Andreas Stein
Coauthors
Adam Everspaugh
(1)
Alberto Ravagnani
(1)
Alex Pellegrini
(2)
Andreas Hülsing
(4)
Andreas Stein
(1)
Anna Krasnova
(1)
Benjamin Smith
(1)
Bernard van Gastel
(1)
Bo-Yin Yang
(3)
Chen-Mou Cheng
(2)
Chitchanok Chuengsatiansup
(4)
Chloe Martindale
(2)
Christian Günther
(1)
Christiane Peters
(4)
Christine van Vredendaal
(3)
Craig Costello
(1)
Daira Hopwood
(1)
Daniel Genkin
(1)
Daniel J. Bernstein
(32)
Dario Catalano
(2)
David Kohel
(1)
Eike Kiltz
(2)
Fabio Campos
(1)
Floyd Johnson
(1)
Francesco Sica
(1)
Gregory Neven
(2)
Gustavo Banegas
(3)
Haixia Shi
(2)
Hansol Ryu
(1)
Henry de Valence
(1)
Hovav Shacham
(1)
Iggy van Hoof
(1)
Jake Maskiewicz
(1)
Jana Sotáková
(2)
Jean-Jacques Quisquater
(1)
Jens Bauch
(1)
Joachim Breitner
(1)
John Malone-Lee
(2)
Jon A. Solworth
(1)
Jonathan Levin
(1)
Joost Renes
(1)
Juliane Krämer
(1)
Kimberley Thissen
(1)
Kit Smeets
(1)
Krijn Reijnders
(1)
Kyung Chul Jeong
(1)
Leon Groot Bruinderink
(3)
Li-Ping Chou
(1)
Lorenz Panny
(4)
Louiza Papachristodoulou
(1)
Marc Joye
(1)
Marc Stevens
(1)
Mathieu Ciet
(1)
Matthew Fredrikson
(1)
Matthew Green
(1)
Maya-Iggy van Hoof
(1)
Michael Meyer
(2)
Michael Naehrig
(1)
Michael Schneider
(1)
Michel Abdalla
(2)
Mihir Bellare
(2)
Mike Burmester
(1)
Mike Hamburg
(1)
Monika Trimoska
(1)
Nadia Heninger
(2)
Nari Lee
(1)
Nicko van Someren
(1)
Niels Duif
(1)
Pascal Paillier
(2)
Peter Birkner
(2)
Peter Schwabe
(7)
Reza Rezaeian Farashahi
(1)
Robin Kwant
(1)
Ruben Niederhagen
(3)
Seongtaek Chee
(1)
Shi Bai
(1)
Sjaak Smetsers
(1)
Stephen Checkoway
(1)
Tadayoshi Kohno
(2)
Tanja Lange
(49)
Thomas Ristenpart
(1)
Tien-Ren Chen
(1)
Tran Ngo
(1)
Tung Chou
(1)
W. Michael Petullo
(1)
Wesley Janssen
(1)
Wouter Castryck
(1)
Xu Zhang
(1)
Yun-An Chang
(1)
Yuval Yarom
(2)
Yvo Desmedt
(3)
Zooko Wilcox-O'Hearn
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to