prof.dr. T. (Tanja) Lange - Publications

Lange, prof.dr. T.
Address :
Technische Universiteit Eindhoven
P.O. Box 513
5600 MB EINDHOVEN
Chair :
Cryptology
Department :
Department of Mathematics and Computer Science
Section :
Discrete Mathematics W&I
Positioncategory :
Professor (HGL)
Position :
Full Professor
Room :
MF 6.104B
Tel :
+31 40-247 4764
Tel (internal) :
4764
Email :
t.lange@tue.nl

Publications

Article

Scientific peer reviewed
2014
2013
2012
2011
2008
2007
2005
2004
2003
2000
Professional
2003

Chapter

Scientific peer reviewed
2016
  • Bernstein, D.J., Lange, T. & Niederhagen, R. (2016). Dual EC : a standardized back door. In P.Y.A. Ryan, J.J. Quisquater & D. Naccache (Eds.), The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (pp. 256-281). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), No. 9100). Dordrecht: Springer. In Scopus Cited 4 times.

Scientific not peer reviewed
2013
2006
Professional
2011
  • Lange, T. (2011). Edwards curve. In H.C.A. Tilborg, van & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd ed.) (pp. 380-382). New York: Springer.

  • Lange, T. (2011). Pairing-based key exchange. In H.C.A. Tilborg, van & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd ed.) (pp. 903-904). New York: Springer.

  • Lange, T. (2011). Vector space. In H.C.A. Tilborg, van & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd ed.) (pp. 1356-1356). New York: Springer.

  • Lange, T. (2011). Hash-based signatures. In H.C.A. Tilborg, van & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd ed.) (pp. 540-542). New York: Springer.

Conference contribution

Scientific peer reviewed
2017
2016
2015
2014
  • Bernstein, D.J. & Lange, T. (2014). Batch NFS. In A. Youssef & A. Joux (Eds.), Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers (pp. 38-58). (Lecture Notes in Computer Science, No. 8781). Springer. In Scopus Cited 2 times.

  • Bernstein, D.J., Chuengsatiansup, C., Lange, T. & Schwabe, P. (2014). Kummer strikes back : new DH speed records. In P. Sarkar & T. Iwata (Eds.), Advances in Cryptology - ASIACRYPT 2014 (20th International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2014, Kaohsiung, Taiwan. Proceedings, Part I) (pp. 317-337). (Lecture Notes in Computer Science, No. 8873). Berlin: Springer. In Scopus Cited 8 times.

  • Bernstein, D.J., Chuengsatiansup, C. & Lange, T. (2014). Curve41417 : Karatsuba revisited. In M. Robshaw & L. Batina (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings) (pp. 316-334). (Lecture Notes in Computer Science, No. 8731). Berlin: Springer. In Scopus Cited 6 times.

  • Checkoway, S., Fredrikson, M., Niederhagen, R.F., Everspaugh, A., Green, M., Lange, T., Ristenpart, T., Bernstein, D.J., Maskiewicz, J, & Shacham, H. (2014). On the practical exploitability of dual EC in TLS implementations. Proceedings of the 23rd USENIX Security Symposium 20-22 August 2014, San Diego CA, USA (pp. 319-335). Usenix Association.

2013
2012
  • Bernstein, D.J. & Lange, T. (2012). Computing small discrete logarithms faster. In S. Galbraith & M. Nandi (Eds.), Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings) (pp. 318-338). (Lecture Notes in Computer Science, No. 7668). Berlin: Springer. In Scopus Cited 11 times.

  • Bernstein, D.J. & Lange, T. (2012). The new SHA-3 software shootout. Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012) (pp. 1-13). Gaithersburg MD: National Institute of Standards and Technology (NIST).

  • Bernstein, D.J., Lange, T. & Schwabe, P. (2012). The security impact of a new cryptographic library. In G. Neven & A. Hevia (Eds.), Progress in Cryptology - LATINCRYPT 2012 (2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings) (pp. 159-176). (Lecture Notes in Computer Science, No. 7533). Berlin: Springer. In Scopus Cited 45 times.

  • Bernstein, D.J., Doumen, J.M., Lange, T. & Oosterwijk, J. (2012). Faster batch forgery identification. In S. Galbraith & M. Nandi (Eds.), Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings) (pp. 454-473). (Lecture Notes in Computer Science, No. 7668). Berlin: Springer. In Scopus Cited 7 times.

2011
  • Bernstein, D.J., Lange, T. & Peters, C.P. (2011). Wild McEliece. In G. Gong, A. Biryukov & D.R. Stinson (Eds.), Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers) (pp. 143-158). (Lecture Notes in Computer Science, No. 6544). Berlin: Springer. In Scopus Cited 25 times.

  • Bernstein, D.J., Lange, T. & Schwabe, P. (2011). On the correct use of the negation map in the Pollard rho method. In N. Fazio, A. Nicolosi, D. Catalano & R. Gennaro (Eds.), Public Key Cryptography - PKC 2011 (14th International Conference on Practice and Theory in Public-Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings) (pp. 128-146). (Lecture Notes in Computer Science, No. 6571). Berlin: Springer. In Scopus Cited 17 times.

  • Bernstein, D.J., Duif, N., Lange, T., Schwabe, P. & Yang, B.Y. (2011). High-speed high-security signatures. In B. Preneel & T. Takagi (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2011 (13th International Workshop, Nara, Japan, September 28–October 1, 2011. Proceedings) (pp. 124-142). (Lecture Notes in Computer Science, No. 6917). Berlin: Springer. In Scopus Cited 33 times.

  • Bernstein, D.J., Lange, T., Peters, C.P. & Schwabe, P. (2011). Really fast syndrome-based hashing. In D. Pointcheval & A. Nitaj (Eds.), Progress in Cryptology - AfricaCrypt 2011 (4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings) (pp. 134-152). (Lecture Notes in Computer Science, No. 6737). Berlin: Springer. In Scopus Cited 8 times.

  • Bernstein, D.J., Lange, T. & Peters, C.P. (2011). Wild McEliece Incognito. In B.Y. Yang (Ed.), Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings) (pp. 244-254). (Lecture Notes in Computer Science, No. 7071). Berlin: Springer. In Scopus Cited 12 times.

  • Bernstein, D.J., Lange, T. & Peters, C.P. (2011). Smaller decoding exponents : ball-collision decoding. In P. Rogaway (Ed.), Advances in Cryptology - CRYPTO 2011 (31st Annual International Cryptology Conference, Santa Barbara CA, USA, August 14-18, 2011. Proceedings) (pp. 743-760). (Lecture Notes in Computer Science, No. 6841). Berlin: Springer. In Scopus Cited 53 times.

  • Bernstein, D.J., Lange, T., Peters, C.P. & Schwabe, P. (2011). Faster 2-regular information-set decoding. In Y.M. Chee (Ed.), Coding and Cryptology (Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings) (pp. 81-98). (Lecture Notes in Computer Science, No. 6639). Berlin: Springer. In Scopus Cited 4 times.

2010
  • Bernstein, D.J., Birkner, P. & Lange, T. (2010). Starfish on strike. In P.S.L.M. Barretto & M. Abdalla (Eds.), Progress in Cryptology - LATINCRYPT 2010 (First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010. Proceedings) (pp. 61-80). (Lecture Notes in Computer Science, No. 6212). Berlin: Springer. In Scopus Cited 5 times.

  • Bernstein, D.J., Chen, H.-C., Cheng, C.M., Lange, T., Niederhagen, R.F., Schwabe, P. & Yang, B.Y. (2010). ECC2K-130 on NVIDIA GPUs. In K.C. Gupta & G. Gong (Eds.), Progress in Cryptology - INDOCRYPT 2010 (11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings) (pp. 328-346). (Lecture Notes in Computer Science, No. 6498). Berlin: Springer. In Scopus Cited 8 times.

  • Bernstein, D.J. & Lange, T. (2010). Type-II optimal polynomial bases. In T. Helleseth & M.A. Hasan (Eds.), Arithmetic of Finite Fields (Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings) (pp. 41-61). (Lecture Notes in Computer Science, No. 6087). Berlin: Springer. In Scopus Cited 10 times.

  • Costello, C., Lange, T. & Naehrig, M. (2010). Faster pairing computations on curves with high-degree twists. In D. Pointcheval & P.Q. Nguyen (Eds.), Public Key Cryptography - PKC 2010 (13th International Conference on Practice and Theory in Public-Key Cryptography, Paris, France, May 26-28, 2010. Proceedings) (pp. 224-242). (Lecture Notes in Computer Science, No. 6056). Berlin: Springer. In Scopus Cited 44 times.

2009
2008
  • Bernstein, D.J. & Lange, T. (2008). Analysis and optimization of elliptic-curve single-scalar multiplication. In G.L. Mullen, I.E. Shparlinski & D. Panario (Eds.), Finite Fields and Applications (Proceedings 8th International Conference, Fq8, Melbourne, Australia, July 9-13, 2007) (pp. 1-20). (Contemporary Mathematics Series, No. 461). Providence RI: American Mathematical Society.

  • Bernstein, D.J., Birkner, P., Joye, M., Lange, T. & Peters, C.P. (2008). Twisted Edwards curves. In S. Vaudenay (Ed.), Progress in Cryptology - Africacrypt 2008 (First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings) (pp. 389-405). (Lecture Notes in Computer Science, No. 5023). Berlin: Springer. In Scopus Cited 135 times.

  • Bernstein, D.J., Lange, T. & Rezaeian Farashahi, R. (2008). Binary Edwards curves. In P. Rohatgi & E. Oswald (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2008 (10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings) (pp. 244-265). (Lecture Notes in Computer Science, No. 5154). Berlin: Springer. In Scopus Cited 51 times.

  • Bernstein, D.J., Lange, T. & Peters, C.P. (2008). Attacking and defending the McEliece cryptosystem. In J. Buchmann & J. Ding (Eds.), Post-Quantum Cryptography (2nd International Workshop, PQCrypto 2008, Cincinnati OH, USA, October 17-19, 2008, Proceedings) (pp. 31-46). (Lecture Notes in Computer Science, No. 5299). Berlin: Springer. In Scopus Cited 94 times.

  • Desmedt, Y. & Lange, T. (2008). Revisiting pairing based group key exchange. In G. Tsudik (Ed.), Financial Cryptography and Data Security (12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers) (pp. 53-68). (Lecture Notes in Computer Science, No. 5143). Berlin: Springer. In Scopus Cited 11 times.

2007
  • Bernstein, D.J. & Lange, T. (2007). Faster addition and doubling on elliptic curves. In K. Kurosawa (Ed.), Advances in Cryptology - Asiacrypt 2007 (13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-7, 2007. Proceedings) (pp. 29-50). (Lecture Notes in Computer Science, No. 4833). Berlin: Springer. In Scopus Cited 169 times.

  • Bernstein, D.J. & Lange, T. (2007). Inverted Edwards coordinates. In S. Boztas & H. Lu (Eds.), Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (17th International Conference, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings) (pp. 20-27). (Lecture Notes in Computer Science, No. 4851). Berlin: Springer. In Scopus Cited 32 times.

  • Bernstein, D.J., Birkner, P., Lange, T. & Peters, C.P. (2007). Optimizing double-base elliptic-curve single-scalar multiplication. In M. Yung, C. Pandu Rangan & K. Srinathan (Eds.), Proceedings of the 8th International Conference on Cryptology in India: Progress in Cryptology (INDOCRYPT 2007) 9-13 December 2007, Chennai, India (pp. 167-182). (Lecture Notes in Computer Science, No. 4859). Berlin, Germany: Springer. In Scopus Cited 21 times.

  • Desmedt, Y., Lange, T. & Burmester, M. (2007). Scalable authenticated tree based group key exchange for ad-hoc groups. In S. Dietrich & R. Dhamija (Eds.), Revised selected papers of the 11th International Conference on Financial Cryptography and Data Security & First International Workshop on Usable Security (FC 2007 & USEC 2007) 12-16 February 2007, Scarborough, Trinidad and Tobago (pp. 104-118). (Lecture Notes in Computer Science, No. 4886). Berlin, Germany: Springer. In Scopus Cited 15 times.

  • Lange, T. (2007). Fast scalar multiplication on elliptic curves. In M. Jutila, A.M. Ernvall-Hytönen, J. Karhumäki & A. Lepistö (Eds.), Proceedings Conference on Algorithmic Number Theory 2007, 8-11 May 2007, Turku, Finland (pp. 82-82). (TUCS General Publications, No. 46). Turku Center for Computer Science.

2006
2005
2004
2003
2002
2001
Scientific not peer reviewed
2005
Professional
2011
  • Lange, T. (2011). Elliptic curves for applications (Tutorial). In S. Chatterjee & D.J. Bernstein (Eds.), Progress in Cryptology - INDOCRYPT 2011 (12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings) (pp. 2-2). (Lecture Notes in Computer Science, No. 7107). Berlin: Springer.

Book editing

Scientific not peer reviewed
2014
2013
2010
2006

Report

Scientific
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2004
2003
2002

Phd Thesis 1 (Research TU/e / Graduation TU/e)

Scientific
2017
2016
2012
  • Niederhagen, R.F. (2012). Parallel cryptanalysis. Eindhoven: Technische Universiteit Eindhoven. ((Co-)promot.: Tanja Lange, Daniel Bernstein & C.M. Cheng).

2011
2009
2008