Netherlands

Results: 16828



#Item
1Logic gates / Theoretical computer science / Boolean satisfiability problem / XOR gate / XNOR gate / AND gate / Data Encryption Standard / OR gate / Block cipher / Mathematical optimization / Circuit

Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:40:06
2Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-06-21 04:41:26
3Education / Educational psychology / Academic transfer / Educational assessment / Standards-based education / Thought / Impact assessment / Formative assessment

Standard Evaluation Protocol 2015 – 2021 Protocol for Research Assessments in the Netherlands Amended version, 2016

Add to Reading List

Source URL: www.vsnu.nl

Language: English - Date: 2016-10-11 07:42:44
4Emerging technologies / Quantum computing / Theoretical computer science / Quantum cryptography / Cryptography / Quantum information science / Technology / Applied mathematics / Post-quantum cryptography / Internet of things

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-12 10:43:16
5Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Ring learning with errors / BLISS signature scheme / Homomorphic encryption / NTRU / Workshop on Cryptographic Hardware and Embedded Systems / Elliptic-curve cryptography / Eurocrypt / Lattice

Léo Ducas BORN IN TOULON, FRANCE, ON OCT. 19, 1986 Eerste Atjehstraat 140E, 1094 KV Amsterdam, The Netherlands.  +

Add to Reading List

Source URL: homepages.cwi.nl

Language: English - Date: 2017-08-03 04:39:12
6Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
7Cryptography / Advanced Encryption Standard / Data Encryption Standard / AES implementations / ARM architecture / Block ciphers / DEAL / AES instruction set / CRYPTON

All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands ,

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:40:08
8Algebra / Mathematics / Linear algebra / Matrices / Matrix theory / Abstract algebra / Coding theory / Trace / Circulant matrix / Square matrix / Matrix / Row and column spaces

Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-03-09 10:10:48
9Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
10Cryptography / Cryptographic hash functions / Post-quantum cryptography / Hashing / Search algorithms / Power analysis / XMSS / Hash function / SHA-2 / DPA / Digital signature / Crypt

Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-03-26 10:26:09
UPDATE