Publications & Talks
Theses
-
PhD thesis:
"Parallel Cryptanalysis"
Eindhoven University of Technology, the Netherlands, 2012.
(pdf)
(more)
-
Diplomarbeit:
"Entwurf und Implementierung einer sicheren
Gruppen-Kommunikationsschicht für Peer-to-Peer Systeme"
("Design and Implementation of a Secure Group Communication Layer for
Peer-To-Peer Systems")
RWTH Aachen University, Germany, 2007.
(pdf)
Publications
Book Chapters:
-
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen:
"Dual EC: A Standardized Back Door"
The New Codebreakers — Essays Dedicated to David Kahn on the Occasion of His 85th Birthday.
Lecture Notes in Computer Science, Vol. 9100, pp. 256–281,
Springer, 2016.
(project website)
(eprint)
(springer)
Refereed Conferences (with proceedings):
-
Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
"Reducing Signature Size of Matrix-Code-Based Signature Schemes"
International Conference on Post-Quantum Cryptography — PQCrypto 2024,
Lecture Notes in Computer Science, Vol 14771, pp. 107—134.
Springer, 2024.
(eprint)
(springer)
-
Joan Boyar, Simon Skjernaa Erfurth, Kim S. Larsen, and Ruben Niederhagen:
"Quotable Signatures for Authenticating Shared Quotes"
To appear in Progress in Cryptology — LatinCrypt 2023, Lecture Notes in Computer Science, Springer.
(arxiv)
-
Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
"Take your MEDS: Digital Signatures from Matrix Code Equivalence"
Progress in Cryptology — AfricaCrypt 2023.
Lecture Notes in Computer Science, Vol 14064, pp. 28—52.
Springer, 2023.
(eprint)
(springer)
-
Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, and Ruben Niederhagen:
"QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging"
Applied Cryptography and Network Security — ACNS 2023.
Lecture Notes in Computer Science, Vol. 13906, pp. 85—111.
Springer, 2023.
(eprint)
(springer)
(acm)
-
Ruben Niederhagen, Johannes Roth, and Julian Wälde:
"Streaming SPHINCS+ for Embedded Devices using the Example of TPMs"
Progress in Cryptology — AfricaCrypt 2022.
Lecture Notes in Computer Science, Vol. 13503, pp. 269—291.
Springer, 2022.
(eprint)
(springer)
-
Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, and Wen Wang:
"Complete and Improved FPGA Implementation of Classic McEliece"
IACR Transactions on Cryptographic Hardware and Embedded Systems — TCHES 2022(3),
pp. 71—113, 2022.
(eprint)
(tches)
-
Sebastian Paul, Yulia Kuzovkova, Norman Lahr, and Ruben Niederhagen:
"Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3"
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security — ACM ASIA CCS 2022.
(eprint)
(acm)
-
Prashanth Mohan, Wen Wang, Bernhard Jungk, Ruben Niederhagen, Jakub Szefer, and Ken Mai:
"ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS"
International Conference on Computer Design — ICCD 2020, pp. 656—662.
IEEE (2020).
(ieee)
-
Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan,
Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li,
Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, and Bo-Yin Yang:
"Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4"
IACR Transactions on Cryptographic Hardware and Embedded Systems — TCHES 2021(1),
pp. 217—238, 2020.
(eprint)
(tches)
-
Norman Lahr, Ruben Niederhagen, Richard Petri, and Simona Samardjiska:
"Side Channel Information Set Decoding using Iterative Chunking:
Plaintext Recovery from the Classic McEliece Hardware Reference Implementation"
Advances in Cryptology — ASIACRYPT 2020,
Lecture Notes in Computer Science, Vol. 12491, pp. 881—910.
Springer, 2020.
(eprint)
(springer)
-
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, and Richard Petri:
"ISA Extensions for Finite Field Arithmetic — Accelerating Kyber and NewHope on RISC-V"
IACR Transactions on Cryptographic Hardware and Embedded Systems — TCHES, 2020(3),
pp. 219—242, 2020.
(eprint)
(tches)
-
Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, and Michael Schneider:
"Post-Quantum TLS on Embedded Systems — Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS"
Proceedings of the 2020 ACM Asia Conference on Computer and Communications Security — AsiaCCS 2020,
pp. 841–852.
ACM, 2020.
(eprint)
(acm)
-
Vinay B. Y. Kumar, Naina Gupta, Anupam Chattopadhyay, Michael Kasper, Christoph Krauß, and Ruben Niederhagen:
"Post-Quantum Secure Boot"
Design, Automation Test in Europe — DATE 2020,
pp. 1582—1585. IEEE (2020).
(ieee)
-
Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, and Ruben Niederhagen:
"XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V"
Selected Areas in Cryptography — SAC 2019,
Lecture Notes in Computer Science, Vol. 11959, pp. 523—550.
Springer, 2020.
(project website)
(eprint)
(springer)
-
Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, and Peter Schwabe:
"The SPHINCS+ Signature Framework"
Proceedings of the 2019 ACM SIGSAC Conference on
Computer and Communications Security — CCS 2019,
pp. 2129—2146.
ACM, 2019.
(eprint)
(acm)
-
Wen Wang, Jakub Szefer, and Ruben Niederhagen:
"FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes"
International Conference on Post-Quantum Cryptography — PQCrypto 2018,
Lecture Notes in Computer Science, Vol. 10786, pp. 77—98.
Springer, 2018.
(project website)
(eprint)
(springer)
-
Ruben Niederhagen, Kai-Chun Ning, and Bo-Yin Yang:
"Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs"
International Conference on Post-Quantum Cryptography — PQCrypto 2018,
Lecture Notes in Computer Science, Vol. 10786, pp. 121—141.
Springer, 2018.
(project website)
(eprint)
(springer)
-
Wen Wang, Jakub Szefer, and Ruben Niederhagen:
"FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes"
Cryptographic Hardware and Embedded Systems — CHES 2017,
Lecture Notes in Computer Science, Vol. 10529, pp. 253—274.
Springer, 2017.
(project website)
(eprint)
(springer)
-
Wen Wang, Jakub Szefer, and Ruben Niederhagen:
"Solving Large Systems of Linear Equations over GF(2) on FPGAs"
Reconfigurable Computing and FPGAs — ReConFig 2016,
IEEE, 2016.
(project website)
(ieee)
-
Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing,
Tanja Lange, Ruben Niederhagen, Christine van Vredendaal:
"How to manipulate curve standards: a white paper for the black hat"
Security Standardisation Research — SSR 2015,
Lecture Notes in Computer Science, Vol. 9497, pp. 109–139,
Springer, 2015.
(project website)
(eprint)
(springer)
-
Pol van Aubel, Daniel J. Bernstein, Ruben Niederhagen:
"Investigating SRAM PUFs in large CPUs and GPUs"
Security, Privacy, and Applied Cryptography Engineering — SPACE 2015,
Lecture Notes in Computer Science, Vol. 9354, pp. 228–247,
Springer, 2015.
(project website)
(eprint)
(springer)
-
Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, and Ruben Niederhagen:
"Bad directions in cryptographic hash functions"
Information Security and Privacy — ACISP 2015,
Lecture Notes in Computer Science, Vol. 9144, pp. 488–508,
Springer, 2015.
(project website)
(eprint)
(springer)
-
Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange,
Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider
Peter Schwabe, and Zooko Wilcox-O'Hearn:
"SPHINCS: practical stateless hash-based signature"
Advances in Cryptology — EUROCRYPT 2015,
Lecture Notes in Computer Science, Vol. 9056, pp. 368–397,
Springer, 2015.
(project website)
(eprint)
(springer)
-
Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Matthew Green, Tanja Lange,
Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham:
"On the Practical Exploitability of Dual EC in TLS Implementations"
23rd USENIX Security Symposium — USENIX Security 2014.
(project website)
(usenix)
-
Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen and Bo-Yin Yang:
"Fast Exhaustive Search for Quadratic Systems in F2 on FPGAs"
Selected Areas in Cryptography — SAC 2013,
Lecture Notes in Computer Science, Vol. 8282, pp. 205—222,
Springer, 2014.
(eprint)
(source code)
(springer)
-
Tung Chou, Chen-Mou Cheng, Ruben Niederhagen and Bo-Yin Yang:
"Solving Quadratic Equations with XL on Parallel Architectures"
Cryptographic Hardware and Embedded Systems — CHES 2012,
Lecture Notes in Computer Science, Vol. 7428, pp. 356—373.
Springer, 2012.
(eprint)
(springer)
-
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange,
Ruben Niederhagen, Peter Schwabe, and Bo-Yin Yang:
"ECC2K-130 on NVIDIA GPUs"
Progress in Cryptology — INDOCRYPT 2010,
Lecture Notes in Computer Science, Vol. 6498, pp. 328—346.
Springer, 2010.
(eprint)
(springer)
-
Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tony Chou,
Ruben Niederhagen, Adi Shamir, and Bo-Yin Yang:
"Fast Exhaustive Search for Polynomial Systems in F2"
Cryptographic Hardware and Embedded Systems — CHES 2010,
Lecture Notes in Computer Science, Vol. 6225, pp. 203—218.
Springer, 2010.
(eprint)
(ext. vers.)
(springer)
-
Michael Naehrig, Ruben Niederhagen, and Peter Schwabe:
"New software speed records for cryptographic pairings"
Progress in Cryptology — LATINCRYPT 2010,
Lecture Notes in Computer Science, Vol. 6212, pp. 109—123.
Springer 2010.
(eprint)
(source code)
(springer)
-
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe:
"ECC2K-130 on Cell CPUs"
Progress in Cryptology — AFRICACRYPT 2010,
Lecture Notes in Computer Science, Vol. 6055, pp. 225—242.
Springer, 2010.
(eprint)
(springer)
-
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen,
Christiane Peters, and Peter Schwabe:
"Implementing Wagner's generalized birthday attack against the
SHA-3 round-1 candidate FSB"
Progress in Cryptology — INDOCRYPT 2009,
Lecture Notes in Computer Science, Vol. 5922, pp. 18—38.
Springer, 2009.
(eprint)
(springer)
Refereed Conferences (without proceedings):
-
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange,
Ruben Niederhagen, Peter Schwabe and Bo-Yin Yang:
"Usable assembly language for GPUs: a success story"
Workshop record of Special-Purpose Hardware for Attacking
Cryptographic Systems — SHARCS 2012.
(eprint)
-
Ruben Niederhagen and Stefan Lankes:
"Evaluation of the Portability of UPC to the Cell Broadband
Engine"
9th International Workshop on
State-of-the-Art in Scientific and Parallel Computing — PARA 2008.
(pdf)
Reports:
-
Ruben Niederhagen and Michael Waidner:
"Practical Post-Quantum Cryptography"
White paper,
Fraunhofer Institute for Secure Information Technology SIT,
Darmstadt, Germany. 2017.
(link)
-
Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen,
Christof Paar, Peter Schwabe, and Ralf Zimmermann:
"Faster elliptic-curve discrete logarithms on FPGAs"
Cryptology ePrint Archive, Report 2016/382, 2016.
(eprint)
-
Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner,
Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme,
Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu,
Frank Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens,
Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe,
Leif Uhsadel, Anthony Van Herrewege, and Bo-Yin Yang:
"Breaking ECC2K-130"
Cryptology ePrint Archive, Report 2009/514, 2009.
(eprint)
Talks
- Sept. 2018 - Invited talk on
"Next Generation Cryptography"
at Haus der Wirtschaft Südhessen, Darmstadt, Germany.
- June 2018 - Invited talk on
"Post-Quantum Cryptography – Overview and Challenges"
at the Utimaco Applied Crypto Symposium,
Bonn, Germany.
- Feb. 2018 - Invited talk on
"Post-Quantum Cryptography and Embedded Systems"
at the SmartCard Workshop,
Fraunhofer SIT, Darmstadt, Germany.
- Feb. 2018 - Invited talk on
"Introduction to Post-Quantum Cryptography and Major Challenges for the Adoption"
at the Fraunhofer Workshop on "Post Quantum Cryptography in Practice",
Fraunhofer Singapore, Singapore.
- Feb. 2018 - Invited talk on
"Efficient Code-based Cryptography for FPGAs"
at the Fraunhofer Workshop on "Post Quantum Cryptography in Practice",
Fraunhofer Singapore, Singapore.
- Nov. 2017 - Invited talk on
"Langfristige IT-Sicherheit durch Krypto-Agilität"
(Longterm Security by Crypto-Agility)
at the IHK-Sicherheitstag,
IHK Darmstadt Rhein Main Neckar, Darmstadt, Germany.
- May 2017 - Opening keynote at an "Eberbacher Gespräch"
on the topic
"Next Generation Cryptography"
at Eberbach Monastery, Eltville am Rhein, Germany.
- Apr. 2017 - Invited talk on
"Langzeitsicherheit und Automotive Security"
(Longterm Security and Automotive Security)
at a CAST-Workshop on Automotive Security,
Fraunhofer SIT, Darmstadt, Germany.
- Sept. 2016 - Invited talk on
"Faster discrete logarithms on FPGAs"
at the Workshop on Elliptic Curve Cryptography – ECC 2016,
Yaşar University, İzmir, Turkey.
- Aug. 2016 - Invited talk on
"Introduction to Cryptography"
at the National Cyber Security Summer School – NCS3 2016,
Ministry of Security and Justice, The Hague, the Netherlands.
- May 2016 - Invited talk on
"PUFs in AMD64 CPUs and GPUs"
at the Dagstuhl Seminar 16202
on "Hardware Security" at Schloss Dagstuhl, Germany.
- June 2015 - Invited talk on
"Dual EC — a standardized back door"
at the Summer School on Real-world Crypto and Privacy,
Šibenik, Croatia.
- Oct. 2014 - Invited talk on
"Dual EC — a standardized back door"
at the Workshop on Elliptic Curve Cryptography – ECC 2014,
Institute of Mathematical Sciences, Chennai, India.
- June 2014 - Invited talk on
"Introduction to High-Performance Cryptanalysis"
at the International Supercomputing Conference – ISC’14,
Leipzig, Germany.
- June 2014 - Invited talk on
"Dual EC — a standardized back door"
at the Mathematics Symposium of the Fysisch-Mathematische Faculteitsvereniging (FMF)
at the University of Groningen, the Netherlands.
- Apr. 2014 - Invited talk on
"Dual EC — a standardized back door"
at the event "Security in Times of Surveillance" at the Eindhoven Institute for the
Protection of Systems and Information, Eindhoven University of Technology,
Eindhoven, the Netherlands.
(pdf)
- Aug. 2013 - Talk on
"Fast Exhaustive Search for Quadratic Systems in F2 on FPGAs"
at Selected Areas in Cryptography — SAC 2013, Burnaby, British Columbia, Canada.
(pdf)
- Sept. 2012 - Talk on
"Solving Quadratic Equations with XL on Parallel Architectures"
at Cryptographic Hardware and Embedded Systems — CHES 2012, Leuven, Belgium.
(pdf)
- Apr. 2010 - Invited talk on
"Attacking elliptic-curve cryptography"
at AMI Opening Symposium, TU Delft, Netherlands.
(pdf)
- Dec. 2009 - Talk on
"Implementing Wagner's generalized birthday attack against the
SHA-3 round-1 candidate FSB"
at Progress in Cryptology — INDOCRYPT 2009, New Delhi, India.
(pdf)
- June 2008 - Introductory talk on
"Evaluation of the Portability of UPC to the Cell Broadband Engine"
in an internal workshop (Cell Meeting) at JSC Forschungszentrum
Jülich, Germany (extended Version of para08).
(pdf)
- May 2008 - Talk on
"Evaluation of the Portability of UPC to the Cell Broadband Engine"
at 9th International Workshop on State-of-the-Art in Scientific and
Parallel Computing — PARA 2008, Trondheim, Norway.
(pdf)