< Back to previous page
Researcher
Jan-Pieter D'Anvers
- Disciplines:Algebra, Applied mathematics in specific fields, Computer architecture and networks, Distributed computing, Information sciences, Information systems, Programming languages, Scientific computing, Theoretical computer science, Visual computing, Other information and computing sciences, Communications, Communications technology, Modelling, Multimedia processing
Affiliations
- Computer Security and Industrial Cryptography (COSIC) (Division)
Member
From1 Aug 2020 → Today - Processing Speech and Images (PSI) (Division)
Member
From1 Aug 2020 → 31 Dec 2016 - ESAT - COSIC, Computer Security and Industrial Cryptography (Division)
Member
From1 Jan 2017 → 31 Jul 2020
Projects
1 - 4 of 4
- Secure Hardware for Post-Quantum CryptographyFrom13 Dec 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Compiler optimisation for fully homomoprhic encryption hardwareFrom16 Aug 2022 → TodayFunding: FWO Strategic Basic Research Grant
- Practical application of post-quantum cryptographyFrom1 Oct 2021 → 30 Sep 2024Funding: FWO junior postdoctoral fellowship
- Design and Security Analysis of Lattice-based Post-Quantum EncryptionFrom16 Jan 2017 → 28 May 2021Funding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1 - 10 of 19
- Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption(2024)Published in: Transactions on Cryptographic Hardware and Embedded SystemsISSN: 2569-2925Issue: 2Volume: 2024Pages: 795 - 818
- Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results(2024)Published in: ACM Transactions on Embedded Computing SystemsISSN: 1539-9087Issue: 2Volume: 23
- Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond(2023)Published in: IACR Transactions on Cryptographic Hardware and Embedded SystemsISSN: 2569-2925Issue: 2Volume: 2023Pages: 418 - 446
- Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-Sliced Implementations(2023)Published in: IEEE Transactions on ComputersISSN: 0018-9340Issue: 2Volume: 72Pages: 321 - 332
- Neural Network Quantisation for Faster Homomorphic Encryption(2023)Published in: 2023 IEEE 29TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN, IOLTSISSN: 1942-9398
- One-Hot Conversion: Towards Faster Table-Based A2B Conversion(2023)Pages: 628 - 657
- FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption(2023)Pages: 741 - 755Number of pages: 15
- Higher-Order Masked Saber(2022)Pages: 93 - 116Number of pages: 24
- Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber(2022)Pages: 3 - 33Number of pages: 31
- Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography(2021)Published in: IACR Transactions on Cryptographic Hardware and Embedded SystemsISSN: 2569-2925Issue: 3Volume: 2021Pages: 334 - 359
Patents
1 - 1 of 1