prof.dr. T. (Tanja) Lange - Publications

Lange, prof.dr. T.
Address :
Technische Universiteit Eindhoven
P.O. Box 513
5600 MB EINDHOVEN
Chair :
Cryptology
Department :
Department of Mathematics and Computer Science
Section :
Discrete Mathematics W&I
Positioncategory :
Professor (HGL)
Position :
Full Professor
Room :
MF 6.104B
Tel :
+31 40-247 4764
Tel (internal) :
4764
Email :
t.lange@tue.nl

Publications

Article

Scientific peer reviewed
2014
2013
2012
2011
2008
2007
2005
2004
2003
2000
Professional
2003

Review article

Scientific peer reviewed
2017

Chapter

Scientific peer reviewed
2017
2016
  • Bernstein, D.J., Lange, T. & Niederhagen, R. (2016). Dual EC : a standardized back door. In P.Y.A. Ryan, J.J. Quisquater & D. Naccache (Eds.), The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (pp. 256-281). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), No. 9100). Dordrecht: Springer. In Scopus Cited 7 times.

Scientific not peer reviewed
2013
2006
Professional
2011
  • Lange, T. (2011). Pairing-based key exchange. In H.C.A. Tilborg, van & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd ed.) (pp. 903-904). New York: Springer.

  • Lange, T. (2011). Vector space. In H.C.A. Tilborg, van & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd ed.) (pp. 1356-1356). New York: Springer.

  • Lange, T. (2011). Hash-based signatures. In H.C.A. Tilborg, van & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd ed.) (pp. 540-542). New York: Springer.

Entry for encyclopedia/dictionary

Scientific peer reviewed
2011
  • Lange, T. (2011). Edwards curves. In S. Jajodia, H.C.A. van Tilborg, S. Jajodia & H.C.A. Tilborg, van (Eds.), Encyclopedia of Cryptography and Security (pp. 380-382). New York: Springer.

  • Lange, T. (2011). Hash based signatures. In H.C.A van Tilborg & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (pp. 540-543). Dordrecht: Springer Netherlands.

  • Lange, T. (2011). Pairing-based key exchange. In H.C.A. van Tilborg & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (pp. 903-904). Dordrecht: Springer Netherlands.

Conference contribution

Scientific peer reviewed
2018
2017
2016
2015
2014
  • Bernstein, D.J., Chuengsatiansup, C. & Lange, T. (2014). Curve41417 : Karatsuba revisited. In M. Robshaw & L. Batina (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings) (pp. 316-334). (Lecture Notes in Computer Science, No. 8731). Berlin: Springer. In Scopus Cited 8 times.

  • Bernstein, D.J., Chuengsatiansup, C., Lange, T. & Schwabe, P. (2014). Kummer strikes back : new DH speed records. In P. Sarkar & T. Iwata (Eds.), Advances in Cryptology - ASIACRYPT 2014 (20th International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2014, Kaohsiung, Taiwan. Proceedings, Part I) (pp. 317-337). (Lecture Notes in Computer Science, No. 8873). Berlin: Springer. In Scopus Cited 12 times.

  • Bernstein, D.J. & Lange, T. (2014). Batch NFS. In A. Youssef & A. Joux (Eds.), Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers (pp. 38-58). (Lecture Notes in Computer Science, No. 8781). Springer. In Scopus Cited 3 times.

  • Checkoway, S., Fredrikson, M., Niederhagen, R.F., Everspaugh, A., Green, M., Lange, T., Ristenpart, T., Bernstein, D.J., Maskiewicz, J, & Shacham, H. (2014). On the practical exploitability of dual EC in TLS implementations. Proceedings of the 23rd USENIX Security Symposium 20-22 August 2014, San Diego CA, USA (pp. 319-335). Usenix Association.

2013
2012
  • Bernstein, D.J. & Lange, T. (2012). Computing small discrete logarithms faster. In S. Galbraith & M. Nandi (Eds.), Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings) (pp. 318-338). (Lecture Notes in Computer Science, No. 7668). Berlin: Springer. In Scopus Cited 11 times.

  • Bernstein, D.J. & Lange, T. (2012). The new SHA-3 software shootout. Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012) (pp. 1-13). Gaithersburg MD: National Institute of Standards and Technology (NIST).

  • Bernstein, D.J., Lange, T. & Schwabe, P. (2012). The security impact of a new cryptographic library. In G. Neven & A. Hevia (Eds.), Progress in Cryptology - LATINCRYPT 2012 (2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings) (pp. 159-176). (Lecture Notes in Computer Science, No. 7533). Berlin: Springer. In Scopus Cited 59 times.

  • Bernstein, D.J., Doumen, J.M., Lange, T. & Oosterwijk, J. (2012). Faster batch forgery identification. In S. Galbraith & M. Nandi (Eds.), Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings) (pp. 454-473). (Lecture Notes in Computer Science, No. 7668). Berlin: Springer. In Scopus Cited 8 times.

2011
  • Bernstein, D.J., Lange, T. & Peters, C.P. (2011). Wild McEliece. In G. Gong, A. Biryukov & D.R. Stinson (Eds.), Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers) (pp. 143-158). (Lecture Notes in Computer Science, No. 6544). Berlin: Springer. In Scopus Cited 27 times.

  • Bernstein, D.J., Lange, T. & Schwabe, P. (2011). On the correct use of the negation map in the Pollard rho method. In N. Fazio, A. Nicolosi, D. Catalano & R. Gennaro (Eds.), Public Key Cryptography - PKC 2011 (14th International Conference on Practice and Theory in Public-Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings) (pp. 128-146). (Lecture Notes in Computer Science, No. 6571). Berlin: Springer. In Scopus Cited 19 times.

  • Bernstein, D.J., Duif, N., Lange, T., Schwabe, P. & Yang, B.Y. (2011). High-speed high-security signatures. In B. Preneel & T. Takagi (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2011 (13th International Workshop, Nara, Japan, September 28–October 1, 2011. Proceedings) (pp. 124-142). (Lecture Notes in Computer Science, No. 6917). Berlin: Springer. In Scopus Cited 43 times.

  • Bernstein, D.J., Lange, T., Peters, C.P. & Schwabe, P. (2011). Really fast syndrome-based hashing. In D. Pointcheval & A. Nitaj (Eds.), Progress in Cryptology - AfricaCrypt 2011 (4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings) (pp. 134-152). (Lecture Notes in Computer Science, No. 6737). Berlin: Springer. In Scopus Cited 8 times.

  • Bernstein, D.J., Lange, T. & Peters, C.P. (2011). Wild McEliece Incognito. In B.Y. Yang (Ed.), Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings) (pp. 244-254). (Lecture Notes in Computer Science, No. 7071). Berlin: Springer. In Scopus Cited 13 times.

  • Bernstein, D.J., Lange, T. & Peters, C.P. (2011). Smaller decoding exponents : ball-collision decoding. In P. Rogaway (Ed.), Advances in Cryptology - CRYPTO 2011 (31st Annual International Cryptology Conference, Santa Barbara CA, USA, August 14-18, 2011. Proceedings) (pp. 743-760). (Lecture Notes in Computer Science, No. 6841). Berlin: Springer. In Scopus Cited 58 times.

  • Bernstein, D.J., Lange, T., Peters, C.P. & Schwabe, P. (2011). Faster 2-regular information-set decoding. In Y.M. Chee (Ed.), Coding and Cryptology (Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings) (pp. 81-98). (Lecture Notes in Computer Science, No. 6639). Berlin: Springer. In Scopus Cited 5 times.

2010
  • Bernstein, D.J., Birkner, P. & Lange, T. (2010). Starfish on strike. In P.S.L.M. Barretto & M. Abdalla (Eds.), Progress in Cryptology - LATINCRYPT 2010 (First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010. Proceedings) (pp. 61-80). (Lecture Notes in Computer Science, No. 6212). Berlin: Springer. In Scopus Cited 5 times.

  • Bernstein, D.J., Chen, H.-C., Cheng, C.M., Lange, T., Niederhagen, R.F., Schwabe, P. & Yang, B.Y. (2010). ECC2K-130 on NVIDIA GPUs. In K.C. Gupta & G. Gong (Eds.), Progress in Cryptology - INDOCRYPT 2010 (11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings) (pp. 328-346). (Lecture Notes in Computer Science, No. 6498). Berlin: Springer. In Scopus Cited 8 times.

  • Bernstein, D.J. & Lange, T. (2010). Type-II optimal polynomial bases. In T. Helleseth & M.A. Hasan (Eds.), Arithmetic of Finite Fields (Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings) (pp. 41-61). (Lecture Notes in Computer Science, No. 6087). Berlin: Springer. In Scopus Cited 11 times.

  • Costello, C., Lange, T. & Naehrig, M. (2010). Faster pairing computations on curves with high-degree twists. In D. Pointcheval & P.Q. Nguyen (Eds.), Public Key Cryptography - PKC 2010 (13th International Conference on Practice and Theory in Public-Key Cryptography, Paris, France, May 26-28, 2010. Proceedings) (pp. 224-242). (Lecture Notes in Computer Science, No. 6056). Berlin: Springer. In Scopus Cited 46 times.

2009
2008
  • Bernstein, D.J. & Lange, T. (2008). Analysis and optimization of elliptic-curve single-scalar multiplication. In G.L. Mullen, I.E. Shparlinski & D. Panario (Eds.), Finite Fields and Applications (Proceedings 8th International Conference, Fq8, Melbourne, Australia, July 9-13, 2007) (pp. 1-20). (Contemporary Mathematics Series, No. 461). Providence RI: American Mathematical Society.

  • Bernstein, D.J., Lange, T. & Rezaeian Farashahi, R. (2008). Binary Edwards curves. In P. Rohatgi & E. Oswald (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2008 (10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings) (pp. 244-265). (Lecture Notes in Computer Science, No. 5154). Berlin: Springer. In Scopus Cited 55 times.

  • Bernstein, D.J., Lange, T. & Peters, C.P. (2008). Attacking and defending the McEliece cryptosystem. In J. Buchmann & J. Ding (Eds.), Post-Quantum Cryptography (2nd International Workshop, PQCrypto 2008, Cincinnati OH, USA, October 17-19, 2008, Proceedings) (pp. 31-46). (Lecture Notes in Computer Science, No. 5299). Berlin: Springer. In Scopus Cited 101 times.

  • Bernstein, D.J., Birkner, P., Joye, M., Lange, T. & Peters, C.P. (2008). Twisted Edwards curves. In S. Vaudenay (Ed.), Progress in Cryptology - Africacrypt 2008 (First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings) (pp. 389-405). (Lecture Notes in Computer Science, No. 5023). Berlin: Springer. In Scopus Cited 147 times.

  • Desmedt, Y. & Lange, T. (2008). Revisiting pairing based group key exchange. In G. Tsudik (Ed.), Financial Cryptography and Data Security (12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers) (pp. 53-68). (Lecture Notes in Computer Science, No. 5143). Berlin: Springer. In Scopus Cited 11 times.

2007
  • Bernstein, D.J. & Lange, T. (2007). Faster addition and doubling on elliptic curves. In K. Kurosawa (Ed.), Advances in Cryptology - Asiacrypt 2007 (13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-7, 2007. Proceedings) (pp. 29-50). (Lecture Notes in Computer Science, No. 4833). Berlin: Springer. In Scopus Cited 175 times.

  • Bernstein, D.J., Birkner, P., Lange, T. & Peters, C.P. (2007). Optimizing double-base elliptic-curve single-scalar multiplication. In M. Yung, C. Pandu Rangan & K. Srinathan (Eds.), Proceedings of the 8th International Conference on Cryptology in India: Progress in Cryptology (INDOCRYPT 2007) 9-13 December 2007, Chennai, India (pp. 167-182). (Lecture Notes in Computer Science, No. 4859). Berlin, Germany: Springer. In Scopus Cited 22 times.

  • Bernstein, D.J. & Lange, T. (2007). Inverted Edwards coordinates. In S. Boztas & H. Lu (Eds.), Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (17th International Conference, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings) (pp. 20-27). (Lecture Notes in Computer Science, No. 4851). Berlin: Springer. In Scopus Cited 32 times.

  • Desmedt, Y., Lange, T. & Burmester, M. (2007). Scalable authenticated tree based group key exchange for ad-hoc groups. In S. Dietrich & R. Dhamija (Eds.), Revised selected papers of the 11th International Conference on Financial Cryptography and Data Security & First International Workshop on Usable Security (FC 2007 & USEC 2007) 12-16 February 2007, Scarborough, Trinidad and Tobago (pp. 104-118). (Lecture Notes in Computer Science, No. 4886). Berlin, Germany: Springer. In Scopus Cited 15 times.

  • Lange, T. (2007). Fast scalar multiplication on elliptic curves. In M. Jutila, A.M. Ernvall-Hytönen, J. Karhumäki & A. Lepistö (Eds.), Proceedings Conference on Algorithmic Number Theory 2007, 8-11 May 2007, Turku, Finland (pp. 82-82). (TUCS General Publications, No. 46). Turku Center for Computer Science.

2006
2005
2004
2003
2002
2001
Scientific not peer reviewed
2005
Professional
2011
  • Lange, T. (2011). Elliptic curves for applications (Tutorial). In S. Chatterjee & D.J. Bernstein (Eds.), Progress in Cryptology - INDOCRYPT 2011 (12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings) (pp. 2-2). (Lecture Notes in Computer Science, No. 7107). Berlin: Springer.

Paper

Scientific
2017

Book editing

Scientific not peer reviewed
2014
2013
2010
2006

Report

Scientific
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2004
2003
2002

Phd Thesis 1 (Research TU/e / Graduation TU/e)

Scientific
2018
2017
2016
2012
  • Niederhagen, R.F. (2012). Parallel cryptanalysis. Eindhoven: Technische Universiteit Eindhoven. ((Co-)promot.: Tanja Lange, Daniel Bernstein & C.M. Cheng).

2011
2009
2008