Jan-Pieter D'Anvers
Jan-Pieter D'Anvers
Researcher, KU Leuven
Verified email at esat.kuleuven.be - Homepage
Cited by
Cited by
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
JP D’Anvers, A Karmakar, SS Roy, F Vercauteren
International Conference on Cryptology in Africa, 282-305, 2018
Saber (round 2 submission)
JP D’Anvers, A Karmakar, SS Roy, F Vercauteren
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
On the impact of decryption failures on the security of LWE/LWR based schemes
JP D’Anvers, F Vercauteren, I Verbauwhede
Decryption failure attacks on IND-CCA secure lattice-based schemes
JP D’Anvers, Q Guo, T Johansson, A Nilsson, F Vercauteren, ...
IACR International Workshop on Public Key Cryptography, 565-598, 2019
Timing attacks on error correcting codes in post-quantum schemes
JP D'Anvers, M Tiepelt, F Vercauteren, I Verbauwhede
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 2-9, 2019
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
JP D’Anvers, F Vercauteren, I Verbauwhede
International Conference on Post-Quantum Cryptography, 103-115, 2019
Saber (round 1 Submission)
JP D’Anvers, A Karmakar, SS Roy, F Vercauteren
Technical report, National Institute of Standards and Technology, 2017 …, 2017
A Side-Channel Resistant Implementation of SABER
M Van Beirendonck, JP D’Anvers, A Karmakar, J Balasch, I Verbauwhede
(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes
JP D’Anvers, M Rossi, F Virdia
Annual International Conference on theTheory and Applications of …, 2020
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
S Bhasin, JP D’Anvers, D Heinz, T Pöppelmann, M Van Beirendonck
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
M Van Beirendonck, JP D’Anvers, I Verbauwhede
Post-Quantum Cryptography: Current state and quantum mitigation
W Beullens, JP D'Anvers, AT Hülsing, T Lange, L Panny, ...
ENISA, 2021
SABER: Mod-LWR based KEM (Round 3 Submission)
A Basso, JMB Mera, JP D’Anvers, A Karmakar, SS Roy, ...
Design and Security Analysis of Lattice-based Post-Quantum Encryption
JP D’Anvers
Multitarget decryption failure attacks and their application to Saber and Kyber
JP D’Anvers, S Batsleer
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
JP D’Anvers, E Orsini, F Vercauteren
Exploiting Decryption Failures in Mersenne Number Cryptosystems
M Tiepelt, JP D'Anvers
Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, 45-54, 2020
The system can't perform the operation now. Try again later.
Articles 1–17