


Остановите войну!
for scientists:


default search action
Joost Renes
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c13]Joppe W. Bos
, Joost Renes
, Amber Sprenkels
:
Dilithium for Memory Constrained Devices. AFRICACRYPT 2022: 217-235 - [c12]Joppe W. Bos, Joost Renes, Christine van Vredendaal:
Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer. USENIX Security Symposium 2022: 3683-3697 - [i20]Joppe W. Bos, Joost Renes, Amber Sprenkels:
Dilithium for Memory Constrained Devices. IACR Cryptol. ePrint Arch. 2022: 323 (2022) - [i19]Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Amber Sprenkels, Geoffrey P. Waters:
Post-Quantum Secure Boot on Vehicle Network Processors. IACR Cryptol. ePrint Arch. 2022: 635 (2022) - [i18]Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal:
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations. IACR Cryptol. ePrint Arch. 2022: 1406 (2022) - 2021
- [j4]Joppe W. Bos, Andreas Hülsing
, Joost Renes
, Christine van Vredendaal:
Rapidly Verifiable XMSS Signatures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 137-168 (2021) - [j3]Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:
Masking Kyber: First- and Higher-Order Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 173-214 (2021) - [c11]Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal:
The Matrix Reloaded: Multiplication Strategies in FrodoKEM. CANS 2021: 72-91 - [c10]Marcel Medwed, Ventzislav Nikov, Joost Renes, Tobias Schneider, Nikita Veshchikov:
Cyber Resilience for Self-Monitoring IoT Devices. CSR 2021: 160-167 - [i17]Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:
Masking Kyber: First- and Higher-Order Implementations. IACR Cryptol. ePrint Arch. 2021: 483 (2021) - [i16]Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal:
The Matrix Reloaded: Multiplication Strategies in FrodoKEM. IACR Cryptol. ePrint Arch. 2021: 711 (2021) - 2020
- [j2]Pedro Maat C. Massolino, Patrick Longa, Joost Renes
, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 245-271 (2020) - [c9]Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
:
Improved Classical Cryptanalysis of SIKE in Practice. Public Key Cryptography (2) 2020: 505-534 - [i15]Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Cryptol. ePrint Arch. 2020: 40 (2020) - [i14]Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal:
Rapidly Verifiable XMSS Signatures. IACR Cryptol. ePrint Arch. 2020: 898 (2020) - [i13]Joppe W. Bos, Joost Renes, Christine van Vredendaal:
Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer. IACR Cryptol. ePrint Arch. 2020: 1303 (2020)
2010 – 2019
- 2019
- [j1]Hüseyin Hisil, Joost Renes:
On Kummer Lines with Full Rational 2-torsion and Their Usage in Cryptography. ACM Trans. Math. Softw. 45(4): 39:1-39:17 (2019) - [c8]Michael Naehrig, Joost Renes:
Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography. ASIACRYPT (2) 2019: 243-272 - [i12]Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia:
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem. IACR Cryptol. ePrint Arch. 2019: 298 (2019) - [i11]Michael Naehrig, Joost Renes:
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography. IACR Cryptol. ePrint Arch. 2019: 499 (2019) - 2018
- [c7]Wouter Castryck
, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes:
CSIDH: An Efficient Post-Quantum Commutative Group Action. ASIACRYPT (3) 2018: 395-427 - [c6]Joost Renes:
Computing Isogenies Between Montgomery Curves Using the Action of (0, 0). PQCrypto 2018: 229-247 - [i10]Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes:
CSIDH: An Efficient Post-Quantum Commutative Group Action. IACR Cryptol. ePrint Arch. 2018: 383 (2018) - [i9]Hüseyin Hisil, Joost Renes:
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography. IACR Cryptol. ePrint Arch. 2018: 839 (2018) - 2017
- [c5]Joost Renes, Benjamin Smith:
qDSA: Small and Secure Digital Signatures with Curve-Based Diffie-Hellman Key Pairs. ASIACRYPT (2) 2017: 273-302 - [c4]Craig Costello, David Jao
, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik:
Efficient Compression of SIDH Public Keys. EUROCRYPT (1) 2017: 679-706 - [i8]Joost Renes
, Benjamin Smith:
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs. CoRR abs/1709.03358 (2017) - [i7]Joost Renes, Benjamin Smith:
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs. IACR Cryptol. ePrint Arch. 2017: 518 (2017) - [i6]Joost Renes:
Computing isogenies between Montgomery curves using the action of (0, 0). IACR Cryptol. ePrint Arch. 2017: 1198 (2017) - 2016
- [c3]Joost Renes
, Peter Schwabe, Benjamin Smith, Lejla Batina:
\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. CHES 2016: 301-320 - [c2]Joost Renes, Craig Costello, Lejla Batina:
Complete Addition Formulas for Prime Order Elliptic Curves. EUROCRYPT (1) 2016: 403-428 - [c1]Pedro Maat C. Massolino, Joost Renes, Lejla Batina:
Implementing Complete Formulas on Weierstrass Curves in Hardware. SPACE 2016: 89-108 - [i5]Joost Renes
, Peter Schwabe, Benjamin Smith, Lejla Batina:
$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. CoRR abs/1604.06059 (2016) - [i4]Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina:
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. IACR Cryptol. ePrint Arch. 2016: 366 (2016) - [i3]Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik:
Efficient compression of SIDH public keys. IACR Cryptol. ePrint Arch. 2016: 963 (2016) - [i2]Pedro Maat C. Massolino, Joost Renes, Lejla Batina:
Implementing Complete Formulas on Weierstrass Curves in Hardware. IACR Cryptol. ePrint Arch. 2016: 1133 (2016) - 2015
- [i1]Joost Renes, Craig Costello, Lejla Batina:
Complete addition formulas for prime order elliptic curves. IACR Cryptol. ePrint Arch. 2015: 1060 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2023-01-25 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint