default search action
Nina Bindel
Person information
- affiliation: SandboxAQ, Palo Alto, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia:
Quantum Lattice Enumeration in Limited Depth. CRYPTO (6) 2024: 72-106 - [c16]Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano:
Batch Signatures, Revisited. CT-RSA 2024: 163-186 - [c15]Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy:
When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications. NDSS 2024 - 2023
- [j6]Nina Bindel, Sarah McCarthy:
The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices. Comput. J. 66(6): 1320-1334 (2023) - [j5]Kristen Csenkey, Nina Bindel:
Post-quantum cryptographic assemblages and the governance of the quantum threat. J. Cybersecur. 9(1) (2023) - [c14]Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen:
To Attest or Not to Attest, This is the Question - Provable Attestation in FIDO2. ASIACRYPT (6) 2023: 297-328 - [c13]Nina Bindel, Cas Cremers, Mang Zhao:
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. SP 2023: 1471-1490 - [i19]Nina Bindel, Britta Hale:
A Note on Hybrid Signature Schemes. IACR Cryptol. ePrint Arch. 2023: 423 (2023) - [i18]Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano:
Batch Signatures, Revisited. IACR Cryptol. ePrint Arch. 2023: 492 (2023) - [i17]Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen:
To attest or not to attest, this is the question - Provable attestation in FIDO2. IACR Cryptol. ePrint Arch. 2023: 1398 (2023) - [i16]Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia:
Quantum Lattice Enumeration in Limited Depth. IACR Cryptol. ePrint Arch. 2023: 1423 (2023) - 2022
- [c12]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange. ESORICS (1) 2022: 677-697 - [i15]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. IACR Cryptol. ePrint Arch. 2022: 131 (2022) - [i14]Nina Bindel, Sarah McCarthy, Geoff Twardokus, Hanif Rahbari:
Drive (Quantum) Safe! â" Towards Post-Quantum Security for V2V Communications. IACR Cryptol. ePrint Arch. 2022: 483 (2022) - [i13]Nina Bindel, Cas Cremers, Mang Zhao:
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. IACR Cryptol. ePrint Arch. 2022: 1029 (2022) - 2021
- [c11]Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. LATINCRYPT 2021: 168-188 - 2020
- [j4]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 269-306 (2020) - [c10]Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. ACNS (1) 2020: 441-460 - [c9]Nina Bindel, John M. Schanck:
Decryption Failure Is More Likely After Success. PQCrypto 2020: 206-225 - [i12]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Cryptol. ePrint Arch. 2020: 54 (2020) - [i11]Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved attacks against key reuse in learning with errors key exchange. IACR Cryptol. ePrint Arch. 2020: 1288 (2020)
2010 – 2019
- 2019
- [j3]Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt:
Estimation of the hardness of the learning with errors problem with a restricted number of samples. J. Math. Cryptol. 13(1): 47-67 (2019) - [j2]Nina Bindel, Johannes Braun, Luca Gladiator, Tobias Stöckert, Johannes Wirth:
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition. J. Open Source Softw. 4(40): 1606 (2019) - [c8]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. PQCrypto 2019: 206-226 - [c7]Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andreas Hülsing, Edoardo Persichetti:
Tighter Proofs of CCA Security in the Quantum Random Oracle Model. TCC (2) 2019: 61-90 - [i10]Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. IACR Cryptol. ePrint Arch. 2019: 85 (2019) - [i9]Nina Bindel, Mike Hamburg, Andreas Hülsing, Edoardo Persichetti:
Tighter proofs of CCA security in the quantum random oracle model. IACR Cryptol. ePrint Arch. 2019: 590 (2019) - [i8]Nina Bindel, John M. Schanck:
Decryption failure is more likely after success. IACR Cryptol. ePrint Arch. 2019: 1392 (2019) - 2018
- [b1]Nina Bindel:
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World. Darmstadt University of Technology, Germany, 2018 - [j1]Nina Bindel, Johannes Buchmann, Susanne Rieß:
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols. Int. J. Inf. Sec. 17(6): 701-718 (2018) - [i7]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2018: 903 (2018) - 2017
- [c6]Nina Bindel, Juliane Krämer, Johannes Schreiber:
Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session). CODES+ISSS 2017: 8:1-8:3 - [c5]Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber:
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. FPS 2017: 225-241 - [c4]Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega:
Revisiting TESLA in the Quantum Random Oracle Model. PQCrypto 2017: 143-162 - [c3]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. PQCrypto 2017: 384-405 - [i6]Markus Schmidt, Nina Bindel:
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples. IACR Cryptol. ePrint Arch. 2017: 140 (2017) - [i5]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. IACR Cryptol. ePrint Arch. 2017: 460 (2017) - [i4]Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber:
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics. IACR Cryptol. ePrint Arch. 2017: 951 (2017) - 2016
- [c2]Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. AFRICACRYPT 2016: 44-60 - [c1]Nina Bindel, Johannes Buchmann, Juliane Krämer:
Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks. FDTC 2016: 63-77 - [i3]Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. IACR Cryptol. ePrint Arch. 2016: 30 (2016) - [i2]Nina Bindel, Johannes Buchmann, Juliane Krämer:
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. IACR Cryptol. ePrint Arch. 2016: 415 (2016) - 2015
- [i1]Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen:
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices. IACR Cryptol. ePrint Arch. 2015: 755 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint