
Ward Beullens
@WardBeullens
Followers
904
Following
1K
Media
3
Statuses
112
Cryptographer at IBM Research. Interested in all aspects of cryptography, but I mostly work on Post-Quantum stuff.
Zurich, Switzerland
Joined June 2012
RT @GiacomoFenzi: Spotlighting Greyhound 🐾, the new amazing work from @KhanhCrypto and @gregor_seiler! .A new super fast and compact polyno….
0
21
0
RT @claucece: This is a very nice website on what women in academia face,as "We start our summary by stating common gender stereotypes such….
sites.google.com
Women are underrepresented in academia, especially in tenured positions. In the last years, the literature shedding light on the reasons for this under-representation has grown steadily. There have...
0
5
0
RT @claucece: If you are around for the NIST's Fifth PQC Standardization Conference, go check our MAYO poster and talk to Matthias Kannwisc….
0
2
0
RT @LoubnaGhammam: Thanks to all participants of #AfricaCrypt_2023. It was a pleasure to meet all of you ;-)
0
5
0
RT @bwesterb: Just looking at the sizes, PQMayo is the most promising submission to the NIST on-ramp I’ve seen. Also the cycle counts are b….
0
3
0
RT @claucece: Recently out of the over is the MAYO-sage code: where we aimed at creating an easy to follow impleme….
github.com
Sage implementation of the MAYO scheme. Contribute to PQCMayo/MAYO-sage development by creating an account on GitHub.
0
5
0
Isogenists have had a monopoly on pretty graphs for far too long! (By the way, I don't know why these graphs look the way they do, if you find out please let me know. )
#ePrint Graph-theorethic Algorithms for the Alternating Trilinear Form Equivalence problem: W Beullens
2
13
62
RT @demishassabis: Since 1969 Strassen’s algorithm has famously stood as the fastest way to multiply 2 matrices - but with #AlphaTensor we’….
0
1K
0
RT @CosicBe: Tim Beyne blogged from #crypto2022 on Ward Beullens' paper "Breaking Rainbow takes a weekend on a laptop", check it out here:….
0
9
0
RT @IACR_News: #ePrint An efficient key recovery attack on SIDH (preliminary version): W Castryck, T Decru
eprint.iacr.org
We present an efficient key recovery attack on the Supersingular Isogeny Diffie-Hellman protocol (SIDH). The attack is based on Kani's "reducibility criterion" for isogenies from products of elliptic...
0
139
0
RT @KomadaEriksen: There's a new bi-weekly seminar on an oddly specific topic in town! @KrijnReijnders and I are happy to announce that the….
0
5
0
1997: IBM's DeepBlue vs. Kasparov.2016: Google's AlphaGo vs. Lee Sedol.202X: Meta's SALSA vs. @tmmlaarhoven? . My money is on Thijs for now.
#ePrint SALSA: Attacking Lattice Cryptography with Transformers: E Wenger, M Chen, F Charton, K Lauter
1
1
22
RT @bascule: The funniest part is how the email tries to list the pros/cons of each scheme, and included "can be broken in a weekend with a….
0
5
0
RT @kleptographic: I wrote a brief summary of @WardBeullens's Rainbow attack! This is probably the most excited I've ever been reading a pa….
0
18
0