中文版
English
助研究員  |  倪儒本  
 
contact
education
experience
interests
activities
publications
Personal (New window)
 
 
 
 
 
Publications
 
Journal Articles
 
1. Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, and Wen Wang, "Complete and Improved FPGA Implementation of Classic McEliece," TCHES, volume 2022, number 3, pages 71-113, 2022. :::icon
2. Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, and Richard Petri, "ISA Extensions for Finite Field Arithmetic — Accelerating Kyber and NewHope on RISC-V," TCHES, volume 2020, number 3, pages 219-242, 2020. :::icon
3. Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, and Bo-Yin Yang, "Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4," TCHES, volume 2021, number 1, pages 217-238, 2020. :::icon
 
 
Conference Papers
 
1. Ruben Niederhagen, Johannes Roth, and Julian Wälde, "Streaming SPHINCS+ for Embedded Devices using the Example of TPMs," to appear in Progress in Cryptology — AFRICACRYPT 2022, Lecture Notes in Computer Science, Springer.
2. Sebastian Paul, Yulia Kuzovkova, Norman Lahr, and Ruben Niederhagen, "Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3," ACM on Asia Conference on Computer and Communications Security, Yuji Suga, Kouichi Sakurai, Xuhua Ding and and Kazue Sako, editors, ACM, pages 727-740, May 2022.
3. Prashanth Mohan, Wen Wang, Bernhard Jungk, Ruben Niederhagen, Jakub Szefer, and Ken Mai, "ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS," International Conference on Computer Design — ICCD 2020, pages 656-662, December 2020.
4. Norman Lahr, Ruben Niederhagen, Richard Petri, and Simona Samardjiska, "Side Channel Information Set Decoding using Iterative Chunking: Plaintext Recovery from the Classic McEliece Hardware Reference Implementation," Advances in Cryptology — ASIACRYPT 2020, Lecture Notes in Computer Science, 12491, Shiho Moriai and Huaxiong Wang, editor, Springer, pages 881-910, December 2020.
5. Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, and Michael Schneider, "Post-Quantum TLS on Embedded Systems — Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS," ACM Asia Conference on Computer and Communications Security — AsiaCCS 2020, ASIA CCS '20, ACM, pages 841-852, October 2020.
6. Vinay B. Y. Kumar, Naina Gupta, Anupam Chattopadhyay, Michael Kasper, Christoph Krauß, and Ruben Niederhagen, "Post-Quantum Secure Boot," Design, Automation & Test in Europe — DATE 2020, pages 1582-1585, IEEE, June 2020.
7. Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, and Ruben Niederhagen, "XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V," Selected Areas in Cryptography — SAC 2019, Lecture Notes in Computer Science, 11959, Kenneth G. Paterson and Douglas Stebila, editor, Springer, pages 523-550, January 2020.
8. Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, and Peter Schwabe, "The SPHINCS+ Signature Framework," ACM SIGSAC Conference on Computer and Communications Security — CCS 2019, CCS '19, ACM, pages 2129-2146, November 2019.
9. Ruben Niederhagen, Kai-Chun Ning, and Bo-Yin Yang, "Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs," Post-Quantum Cryptography — PQCrypto 2018, Lecture Notes in Computer Science, 10786, Tanja Lange and Rainer Steinwandt, editor, Springer, pages 121-141, April 2018.
10. Wen Wang, Jakub Szefer, and Ruben Niederhagen, "FPGA-based Niederreiter Cryptosystem using Binary Goppa Code," Post-Quantum Cryptography — PQCrypto 2018, Lecture Notes in Computer Science, 10786, Tanja Lange and Rainer Steinwandt, editor, Springer, pages 77-98, April 2018.
11. Wen Wang, Jakub Szefer, and Ruben Niederhagen, "FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes," Cryptographic Hardware and Embedded Systems — CHES 2017, Lecture Notes in Computer Science, 10529, Wieland Fischer and Naofumi Homma, editor, Springer, pages 253-274, August 2017.
12. Wen Wang, Jakub Szefer, and Ruben Niederhagen, "Solving Large Systems of Linear Equations over GF(2) on FPGAs," Reconfigurable Computing and FPGAs — ReConFig 2016, pages 1-7, IEEE, December 2016.
13. Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal, "How to manipulate curve standards: a white paper for the black hat," Security Standardisation Research — SSR 2015, Lecture Notes in Computer Science, 9497, Liqun Chen and Shin'ichiro Matsuo, editor, Springer, pages 109-139, December 2015.
14. Pol van Aubel, Daniel J. Bernstein, Ruben Niederhagen, "Investigating SRAM PUFs in large CPUs and GPUs," Security, Privacy, and Applied Cryptography Engineering — SPACE 2015, Lecture Notes in Computer Science, 9354, Rajat Subhra Chakraborty and Peter Schwabe and Jon Solworth, editor, Springer, pages 228-247, November 2015.
15. Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, and Ruben Niederhagen, "Bad directions in cryptographic hash functions," Information Security and Privacy — ACISP 2015, Lecture Notes in Computer Science, 9144, Ernest Foo and Douglas Stebila, editor, Springer, pages 488-508, June 2015.
16. Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider Peter Schwabe, and Zooko Wilcox-O'Hearn, "SPHINCS: practical stateless hash-based signature," Advances in Cryptology — EUROCRYPT 2015, Lecture Notes in Computer Science, 9056, Elisabeth Oswald and Marc Fischlin, editor, Springer, pages 368-397, April 2015.
17. Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham, "On the Practical Exploitability of Dual EC in TLS Implementations," USENIX Security Symposium — USENIX Security 2014, USENIX Association, pages 319-335, August 2014.
18. Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen and Bo-Yin Yang, "Fast Exhaustive Search for Quadratic Systems in F2 on FPGAs," Selected Areas in Cryptography — SAC 2013, Lecture Notes in Computer Science, 8282, Tanja Lange and Kristin Lauter and Petr Lisoněk, editor, Springer, pages 205-222, May 2013.
19. Tung Chou, Chen-Mou Cheng, Ruben Niederhagen and Bo-Yin Yang, "Solving Quadratic Equations with XL on Parallel Architectures," Cryptographic Hardware and Embedded Systems — CHES 2012, Lecture Notes in Computer Science, 7428, Emmanuel ggProuff and Patrick Schaumont, editor, Springer, pages 356-373, September 2012.
20. Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, and Bo-Yin Yang, "ECC2K-130 on NVIDIA GPUs," Progress in Cryptology — INDOCRYPT 2010, Lecture Notes in Computer Science, 6498, Guang Gong and Kishan Chand Gupta, editor, Springer, pages 328-346, December 2010.
21. Michael Naehrig, Ruben Niederhagen, and Peter Schwabe, "New software speed records for cryptographic pairings," Progress in Cryptology — LATINCRYPT 2010, Lecture Notes in Computer Science, 6212, Michel Abdalla and Paulo S. L. M. Barreto, editor, Springer, pages 109-123, August 2010.
22. Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tony Chou, Ruben Niederhagen, Adi Shamir, and Bo-Yin Yang, "Fast Exhaustive Search for Polynomial Systems in F2," Cryptographic Hardware and Embedded Systems — CHES 2010, Lecture Notes in Computer Science, 6225, Stefan Mangard and Francois-Xavier Standaert, editor, Springer, pages 203-218, August 2010.
23. Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe, "ECC2K-130 on Cell CPUs," Progress in Cryptology — AFRICACRYPT 2010, Lecture Notes in Computer Science, 6055, Daniel J. Bernstein and Tanja Lange, editor, Springer, pages 225-242, May 2010.
24. Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, and Peter Schwabe, "Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB," Progress in Cryptology — INDOCRYPT 2009, Lecture Notes in Computer Science, 5922, Bimal Roy and Nicolas Sendrier, editor, Springer, pages 18-38, December 2009.
 
 
Technical Reports
 
1. Jean-Philippe Aumasson, Daniel J. Bernstein, Ward Beullens, Christoph Dobraunig, Maria Eichlseder, Scott Fluhrer, Stefan-Lukas Gazdag, Andreas Hülsing, Panos Kampanakis, Stefan Kölbl, Tanja Lange, Martin M. Lauridsen, Florian Mendel, Ruben Niederhagen, Christian Rechberger, Joost Rijneveld, Peter Schwabe, Bas Westerbaan, "SPHINCS+ – Submission to the NIST post-quantum project," NIST, October 2020.
2. Martin R. Albrecht, Daniel J. Bernstein, Tung Chou, Carlos Cid, Jan Gilcher, Tanja Lange, Varun Maram, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Kenneth G. Paterson, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Cen Jung Tjhai, Martin Tomlinson, and Wen Wang, "Classic McEliece – Submission to the NIST post-quantum project," NIST, October 2020.
3. Ruben Niederhagen and Michael Waidner, "Practical Post-Quantum Cryptography," Fraunhofer Institute for Secure Information Technology SIT, 2017.
 
 
Book & Book Chapters
 
1. Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen,, chapter "Dual EC: A Standardized Back Door," "The New Codebreakers — Essays Dedicated to David Kahn on the Occasion of His 85th Birthday," Peter Y. A. Ryan and David Naccache and Jean-Jacques Quisquater, editor, Lecture Notes in Computer Science, volume 9100, pages 256-281, Springer, March 2016.
 
 
Others
 
1. Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, and Ralf Zimmermann, "Faster elliptic-curve discrete logarithms on FPGAs," 2016, Cryptology ePrint Archive, Report 2016/382
2. Ruben Niederhagen, "Parallel Cryptanalysis," Eindhoven University of Technology, Eindhoven, the Netherlands, April 2012.
3. Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe and Bo-Yin Yang, "Usable assembly language for GPUs: a success story,", Workshop record of Special-Purpose Hardware for Attacking Cryptographic Systems — SHARCS 2012.
4. Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, and Bo-Yin Yang, "Breaking ECC2K-130," 2009, Cryptology ePrint Archive, Report 2009/514
5. Ruben Niederhagen and Stefan Lankes, "Evaluation of the Portability of UPC to the Cell Broadband Engine,", 9th International Workshop on State-of-the-Art in Scientific and Parallel Computing — PARA 2008.
6. Ruben Niederhagen, "Design and Implementation of a Secure Group Communication Layer for Peer-To-Peer Systems," RWTH Aachen University, Aachen, Germany, April 2007.
 
 
bg