Follow
Jan-Pieter D'Anvers
Jan-Pieter D'Anvers
Researcher, KU Leuven
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
JP D’Anvers, A Karmakar, S Sinha Roy, F Vercauteren
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
3282018
Saber (round 2 submission)
JP D’Anvers, A Karmakar, SS Roy, F Vercauteren
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
147*2019
A Side-Channel Resistant Implementation of SABER
M Van Beirendonck, JP D’Anvers, A Karmakar, J Balasch, I Verbauwhede
92*2020
SABER: Mod-LWR based KEM (Round 3 Submission)
A Basso, JMB Mera, JP D’Anvers, A Karmakar, SS Roy, ...
79*2020
Timing attacks on error correcting codes in post-quantum schemes
JP D'Anvers, M Tiepelt, F Vercauteren, I Verbauwhede
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 2-9, 2019
672019
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
S Bhasin, JP D’Anvers, D Heinz, T Pöppelmann, M Van Beirendonck
642021
Decryption failure attacks on IND-CCA secure lattice-based schemes
JP D’Anvers, Q Guo, T Johansson, A Nilsson, F Vercauteren, ...
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
612019
On the impact of decryption failures on the security of LWE/LWR based schemes
JP D’Anvers, F Vercauteren, I Verbauwhede
452018
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
JP D’Anvers, F Vercauteren, I Verbauwhede
Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019
382019
Saber (round 1 Submission)
JP D’Anvers, A Karmakar, SS Roy, F Vercauteren
Technical report, National Institute of Standards and Technology, 2017 …, 2017
38*2017
(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes
JP D’Anvers, M Rossi, F Virdia
Annual International Conference on theTheory and Applications of …, 2020
362020
Higher-order masked saber
S Kundu, JP D’Anvers, M Van Beirendonck, A Karmakar, I Verbauwhede
International Conference on Security and Cryptography for Networks, 93-116, 2022
242022
Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations
JP D’Anvers, M Van Beirendonck, I Verbauwhede
IEEE Transactions on Computers 72 (2), 321-332, 2022
242022
Higher-order masked ciphertext comparison for lattice-based cryptography
JP D'Anvers, D Heinz, P Pessl, M Van Beirendonck, I Verbauwhede
IACR, 2021
242021
Post-Quantum Cryptography: Current state and quantum mitigation
W Beullens, JP D'Anvers, AT Hülsing, T Lange, L Panny, ...
ENISA, 2021
20*2021
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results
P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi
ACM Transactions on Embedded Computing Systems, 2022
182022
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
M Van Beirendonck, JP D’Anvers, I Verbauwhede
172021
Pushing the limits of generic side-channel attacks on LWE-based KEMs-parallel PC oracle attacks on Kyber KEM and beyond
G Rajendran, P Ravi, JP D’anvers, S Bhasin, A Chattopadhyay
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023
162023
FPT: A fixed-point accelerator for torus fully homomorphic encryption
M Van Beirendonck, JP D'Anvers, F Turan, I Verbauwhede
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
152023
Multitarget decryption failure attacks and their application to Saber and Kyber
JP D’Anvers, S Batsleer
82021
The system can't perform the operation now. Try again later.
Articles 1–20