Tanja Lange
#174,225
Most Influential Person Now
Tanja Lange's AcademicInfluence.com Rankings
Tanja Langecomputer-science Degrees
Computer Science
#10756
World Rank
#11321
Historical Rank
Software Engineering
#311
World Rank
#317
Historical Rank
Database
#7733
World Rank
#8040
Historical Rank

Download Badge
Computer Science
Why Is Tanja Lange Influential?
(Suggest an Edit or Addition)Tanja Lange's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Handbook of Elliptic and Hyperelliptic Curve Cryptography (2005) (1154)
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions (2005) (931)
- High-speed high-security signatures (2011) (601)
- Faster Addition and Doubling on Elliptic Curves (2007) (467)
- Twisted Edwards Curves (2008) (408)
- Attacking and defending the McEliece cryptosystem (2008) (337)
- SPHINCS: Practical Stateless Hash-Based Signatures (2015) (297)
- CSIDH: An Efficient Post-Quantum Commutative Group Action (2018) (288)
- The Security Impact of a New Cryptographic Library (2012) (242)
- Complex Multiplication (2005) (235)
- Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme (2016) (188)
- Smaller decoding exponents: ball-collision decoding (2011) (180)
- Formulae for Arithmetic on Genus 2 Hyperelliptic Curves (2005) (169)
- Elligator: elliptic-curve points indistinguishable from uniform random strings (2013) (168)
- ECRYPT yearly report on algorithms and keysizes (2009) (143)
- Binary Edwards Curves (2008) (134)
- NTRU Prime: Reducing Attack Surface at Low Cost (2017) (128)
- On the Practical Exploitability of Dual EC in TLS Implementations (2014) (126)
- Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings (2006) (112)
- Faster Pairing Computations on Curves with High-Degree Twists (2010) (109)
- Factoring RSA keys from certified smart cards: Coppersmith in the wild (2013) (102)
- Inverted Edwards Coordinates (2007) (88)
- Faster Computation of the Tate Pairing (2009) (85)
- Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae (2002) (84)
- Dual EC: A Standardized Back Door (2015) (83)
- ECM on Graphics Cards (2009) (83)
- Pairing-Based Cryptography (2005) (80)
- Non-uniform cracks in the concrete: the power of free precomputation (2013) (78)
- Analysis and optimization of elliptic-curve single-scalar multiplication (2007) (74)
- Kummer Strikes Back: New DH Speed Records (2014) (72)
- Quantum Algorithms for the Subset-Sum Problem (2013) (69)
- Initial recommendations of long-term secure post-quantum systems (2015) (68)
- How to manipulate curve standards: a white paper for the black hat (2014) (65)
- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication (2007) (62)
- Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings (2010) (62)
- On the correct use of the negation map in the Pollard rho method (2011) (59)
- Breaking ECC2K-130 (2009) (58)
- Wild McEliece (2010) (58)
- Sliding Right into Disaster: Left-to-Right Sliding Windows Leak (2017) (56)
- SPHINCS + Submission to the NIST post-quantum project (2017) (55)
- ECM using Edwards curves (2012) (55)
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies (2019) (55)
- Certain Exponential Sums and Random Walks on Elliptic Curves (2005) (54)
- Computing Small Discrete Logarithms Faster (2012) (53)
- Arithmetic of Elliptic Curves (2005) (52)
- The billion-mulmod-per-second PC (2009) (51)
- Twisted Hessian Curves (2015) (50)
- Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves (2002) (50)
- Efficient Arithmetic on Hyperelliptic Curves (2002) (49)
- Never Trust a Bunny (2012) (47)
- Curve41417: Karatsuba revisited (2014) (45)
- Tighter, faster, simpler side-channel security evaluations beyond computing power (2015) (45)
- Efficient Doubling on Genus Two Curves over Binary Fields (2004) (45)
- A complete set of addition laws for incomplete Edwards curves (2011) (41)
- NTRU Prime (2016) (40)
- Speeding up the Arithmetic on Koblitz Curves of Genus Two (2000) (40)
- Weighted Coordinates on Genus 2 Hyperelliptic Curves (2002) (39)
- Montgomery curves and the Montgomery ladder (2017) (39)
- MinimaLT: minimal-latency networking through better security (2013) (37)
- Hash-Based Signatures (2011) (35)
- Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms (2003) (35)
- ECC2K-130 on NVIDIA GPUs (2010) (33)
- Selected Areas in Cryptography -- SAC 2013 (2013) (32)
- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups (2007) (32)
- Faster Batch Forgery Identification (2012) (30)
- Introduction to Public-Key Cryptography (2005) (30)
- Distribution of some sequences of points on elliptic curves (2007) (30)
- Post-quantum cryptography - dealing with the fallout of physics success (2017) (29)
- Really Fast Syndrome-Based Hashing (2011) (27)
- Koblitz curve cryptosystems (2005) (26)
- Explicit bounds for generic decoding algorithms for code-based cryptography (2009) (26)
- Short Generators Without Quantum Computers: The Case of Multiquadratics (2017) (25)
- Wild McEliece Incognito (2011) (25)
- Concrete quantum cryptanalysis of binary elliptic curves (2020) (25)
- Type-II Optimal Polynomial Bases (2010) (25)
- ECRYPT Stream Cipher Project (2011) (24)
- Polynomial Interpolation of the Elliptic Curve and XTR Discrete Logarithm (2002) (24)
- Two grumpy giants and a baby (2013) (24)
- EdDSA for more curves (2015) (23)
- A note on López-Dahab coordinates (2004) (23)
- HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction (2018) (23)
- Fast Bilinear Maps from the Tate-Lichtenbaum Pairing on Hyperelliptic Curves (2006) (21)
- Interpolation of the Discrete Logarithm in Fq by Boolean Functions and by Polynomials in Several Variables Modulo a Divisor of Q-1 (2003) (20)
- Pairing-Based Cryptography – Pairing 2012 (2012) (20)
- Secure and fair two-party computation (2007) (19)
- Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto (2017) (19)
- Efficient Arithmetic on Hyperelliptic Koblitz Curves (2001) (19)
- Linear Complexity of the Discrete Logarithm (2003) (19)
- Human Ear Recognition (2011) (19)
- On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two (2005) (18)
- Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB (2009) (18)
- The new SHA-3 software shootout (2012) (18)
- Collisions in Fast Generation of Ideal Classes and Points on Hyperelliptic and Elliptic Curves (2005) (18)
- Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition (2012) (17)
- Vector Space (2011) (17)
- Starfish on Strike (2010) (16)
- Revisiting Pairing Based Group Key Exchange (2008) (16)
- Trace zero subvarieties of genus 2 curves for cryptosystems (2004) (16)
- Selected areas in cryptography SAC 2013 : 20th International Conference Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers (2014) (16)
- Kangaroos in Side-Channel Attacks (2014) (16)
- Hyper-and-elliptic-curve cryptography (2014) (16)
- Incomplete character sums over finite fields and their application to the interpolation of the discrete logarithm by Boolean functions (2002) (15)
- MATHEMATICAL BACKGROUND OF PUBLIC KEY CRYPTOGRAPHY (2005) (15)
- The Certicom Challenges ECC2-X (2009) (14)
- Double-base scalar multiplication revisited (2017) (14)
- Faster 2-Regular Information-Set Decoding (2011) (14)
- Searchable encryption revisited (2006) (13)
- Interpolation of the Elliptic Curve Diffie-Hellman Mapping (2003) (13)
- Faster Pairing Computation (2009) (13)
- Entity Resolution (2011) (12)
- Faster computation of Tate pairings (2009) (12)
- Random Numbers Generation and Testing (2005) (12)
- Arithmetic of elliptic curves (Chapter 13) (2006) (12)
- Montgomery Addition for Genus Two Curves (2004) (11)
- Post-Quantum Cryptography: Current state and quantum mitigation (2021) (11)
- Varieties over Special Fields (2005) (11)
- Batch NFS (2014) (10)
- Lattice Klepto - Turning Post-Quantum Crypto Against Itself (2017) (9)
- Faster discrete logarithms on FPGAs (2016) (9)
- CTIDH: faster constant-time CSIDH (2021) (9)
- Bad directions in cryptographic hash functions (2015) (9)
- Failures in NIST ’ s ECC standards (2015) (8)
- Faster elliptic-curve discrete logarithms on FPGAs (2016) (8)
- Verifying Post-Quantum Signatures in 8 kB of RAM (2021) (7)
- Edwards Curves (2011) (7)
- Background on Curves and Jacobians (2005) (7)
- Non-randomness of S-unit lattices (2021) (7)
- Ball-collision decoding (2010) (6)
- Algorithms for Factoring Polynomials over Finite Fields (2001) (6)
- SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2 (2005) (6)
- Pairing-Based Cryptography - Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers (2013) (5)
- On using expansions to the base of −2 (2003) (5)
- Trace Zero Subvariety for Cryptosystems (2003) (5)
- Arithmetic of Hyperelliptic Curves (2005) (5)
- Challenges for Cryptology Research in Europe for 2007-2013 and beyond (2006) (4)
- McTiny: fast high-confidence post-quantum key erasure for tiny network servers (2019) (4)
- Progress in Cryptology - INDOCRYPT 2006: 7th International Conference on Cryptology in IndiaKolkata, India, December 11-13, 2006Proceedings (Lecture Notes in Computer Science) (2007) (4)
- SPHINCS+ - Submission to the NIST post-quantum cryptography project (2017) (4)
- Preface: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings (2018) (4)
- Arithmetic on binary genus 2 curves suitable for small devices (2005) (4)
- Transfer of Discrete Logarithms (2005) (3)
- Arithmetic of Special Curves (2005) (3)
- Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282 (2013) (3)
- Usable assembly language for GPUs: a success story (2012) (3)
- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng (2006) (3)
- Speeding up the arithmetic on hyperelliptic Koblitz curves of genus two (2001) (3)
- Mathematical Countermeasures against Side-Channel Attacks (2005) (3)
- 23rd USENIX Security Symposium (2014) (2)
- Factoring polynomials over arbitrary finite fields (2000) (2)
- Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions (2021) (2)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (2)
- Random numbers, generation and testing (Chapter 30) (2006) (2)
- High-speed high-security signatures (2012) (1)
- Introduction to public-key cryptography (Chapter 1) (2006) (1)
- Algebraic Realizations of DL Systems (2005) (1)
- Fast scalar multiplication on elliptic curves (2007) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Research Agenda for the Future of Cryptology † (2003) (1)
- Arithmetic of hyperelliptic curves (Chapter 14) (2006) (1)
- (In-)Secure messaging with the Silent Circle instant messaging protocol (2016) (1)
- Background on curves and Jacobians (Chapter 4) (2006) (1)
- How to manipulate curve standards (2015) (1)
- Varieties over special fields (Chapter 5) (2006) (1)
- ANTS X Proceedings of the Tenth Algorithmic Number Theory Symposium msp Two grumpy giants and a baby (2013) (1)
- Transfer of discrete logarithmics (Chapter 22) (2006) (0)
- Interpolation of the discrete logarithm in a finite field of characteristic two by Boolean functions (2005) (0)
- Pairing-Based Key Exchange (2011) (0)
- Progress in Cryptology – LATINCRYPT 2017 (2017) (0)
- Elliptic Curves for Applications (2011) (0)
- Background on Weil descent (Chapter 7) (2006) (0)
- MasterMath Cryptology Course (2015) (0)
- Interpolation of the Discrete Logarithm in Finite Fields by Boolean Functions (2001) (0)
- Preface : Selected areas in cryptography - SAC 2013 : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers (2014) (0)
- N T ] 6 A pr 2 00 9 Faster Pairing Computation (2009) (0)
- Abstract for Poster Session at Ants 2006, Poster Title: Efficient Arithmetic on Binary Hyperelliptic Curves (0)
- Proceedings of the 5th international conference on Pairing-Based Cryptography (2012) (0)
- Under surveillance (2012) (0)
- Proceedings of the 7th international conference on Cryptology in India (2006) (0)
- Algebraic realizations of DL systems (Chapter 23) (2006) (0)
- Breaking ECC 2 K-130 (2017) (0)
- Time-Memory Analysis of Parallel Collision Search Algorithms (2021) (0)
- Smart card implementation of a digital signature scheme for Twisted Edwards curves (2011) (0)
- J un 2 00 9 Faster Computation of Tate Pairings (2009) (0)
- The Future of Crypto: Getting from Here to Guarantees (2014) (0)
- Arithmetic of special curves (Chapter 15) (2006) (0)
- Disorientation faults in CSIDH (2022) (0)
- Curve-Based Cryptography (2017) (0)
- Addition formulas for elliptic curves (2013) (0)
- Proceedings of the Third international conference on Cryptology in Africa (2010) (0)
- Quantum circuits for the CSIDH (2019) (0)
- Elliptic curves for applications (Tutorial) (2011) (0)
- Isogeny-based Group Signatures and Accountable Ring Signatures in QROM (2021) (0)
- Symposium (1987) (0)
- Background on Weil Descent (2005) (0)
- Pairing-based cryptography (Chapter 24) (2006) (0)
- Algorithms for pairing-based cryptography (2007) (0)
- Curve 41417 : Karatsuba Revisited (2014) (0)
- Cryptanalysis of Skein (2010) (0)
- Private Key Cryptosystem (2006) (0)
This paper list is powered by the following services: