Welcome to my homepage! My name is Thijs Laarhoven, and I am currently a principal cryptographer at NXP Semiconductors in Eindhoven, The Netherlands. Before this, I was a research scientist at TNO, the Dutch Organization for Applied Scientific Research, in The Hague, The Netherlands. Before that, I was a postdoctoral researcher at the Eindhoven University of Technology, in the Netherlands. During this postdoc, I held a temporary visiting scientist position at the University of California, Berkeley, for the Spring 2020 semester. Prior to that, I was a postdoctoral researcher at IBM Research in Zurich, Switzerland. Before that, I completed my PhD at the Eindhoven University of Technology, in the Netherlands. And before that, I completed my MSc with a graduation project at Irdeto< in Eindhoven, The Netherlands.


Quantum-Safe Cryptography

Shor's breakthrough work in the late 1990s demonstrated that if an attacker has a large-scale quantum computer, then many encryption schemes which are in use today (e.g. RSA, Diffie-Hellman) no longer provide security. Although such large-scale quantum computers (likely) do not exist yet, experts predict that within a few decades such computers may well exist, rendering classical forms of encryption insecure. The field of quantum-safe cryptography concerns the development of new cryptographic primitives, which offer security even against such powerful quantum adversaries.

Homomorphic Encryption

Cryptography is commonly used for data at rest (e.g. static data stored on server), and for data in transit (e.g. for securing communication). In an ideal world, however, data remains encrypted and invisible to the outside world even when it is in use. Homomorphic encryption is a special type of encryption, enabling computations to be performed on encrypted data, without having to decrypt data in between. Using this form of encryption can offer tremendous privacy benefits, but work still needs to be done to make this form of encryption practical in real-world applications.

Multiparty Computation

In a world where big data is the norm, many organizations may benefit from being able to use all this data for analytics and insights. However, this data often cannot be used for these purposes due to privacy regulations. Multiparty computation is a technology that lets multiple organizations, who each have partial data sets, to collaborate and perform analytics on their combined data sets, without ever having to disclose their data sets to the other parties. By doing joint computations and exchanging "secret-shared" data, the parties can thereby obtain improved insights.

Secure Machine Learning

With the rise of machine learning, and neural networks overtaking "classical" algorithms in terms of performance and efficiency for various tasks (from playing chess to generating images), we are heading to a world where machine learning will be the norm for arbitrary tasks. This new computing paradigm offers many opportunities, but also various challenges related to private data processing. Various privacy-enhancing technologies can be used to make machine learning more privacy-friendly, and allow the world to use these tools without having to give up their private data.








Chess title




Ever since my childhood I enjoyed solving puzzles and mathematical problems, especially those naturally appearing in real life. After graduating in applied mathematics I pursued a research career in lattice‑based cryptography, focusing on the practical hardness of solving hard lattice problems, contributing to constructing efficient lattice‑based cryptographic primitives, and studying better high‑dimensional nearest neighbor methods, which form a key ingredient for state‑of‑the‑art lattice‑based cryptanalysis.

Besides being able to work independently and setting my own agenda, one of my strengths is to find the right perspective for a complex task, and to see how techniques from other areas can be used to solve these problems efficiently. For instance, in my paper at Crypto 2015 I made a new connection between lattice algorithms and nearest neighbor searching, marking the beginning of a long line of new work on this topic.


Aug 2023 - present

Principal Cryptographer

As one of the leading chip manufacturing companies in the world, NXP is committed to providing strong security solutions on chips, keeping in mind the limited computational capabilities of chips for ensuring security in untrusted environments. Apart from existing threats and solutions, NXP is also working hard on a smooth transition to quantum-secure solutions in the near future. My contributions involve providing expertise on quantum-safe cryptography, as well as getting involved with the transition from theoretical solutions to actual secure implementations of these schemes.

Dec 2021 - Jul 2023

Research Scientist

At TNO, the Dutch Organization for Applied Scientific Research, I contribute to bringing digital security innovations from the lab into the field. This involves going beyond academic research, seeing how technologies can land in society and make a positive impact in government or industry settings, and demonstrating their added value through proof-of-concept demonstrations of the technology. Focus areas at TNO include the migration to quantum-safe cryptography, and finding ways to collaborate on privacy-sensitive distributed data with tools such as multiparty computation and (fully) homomorphic encryption.

Nov 2017 - Nov 2021

Postdoctoral Researcher

For my postdoc at the TU/e I studied topics related to lattices and nearest neighbor searching, in the context of lattice-based (post-quantum) cryptography, and for various applications that require finding similar items in large databases. For the period 2019-2021, this research was funded by a three-year personal NWO Veni innovational research grant of EUR 250.000, which supports outstanding researchers to pursue their line of research for three years at any Dutch university.

Jan 2020 - May 2020

Visiting Scientist

During Spring 2020 I was an invited visiting scientist to the research program titled "Lattices: Algorithms, Complexity, and Cryptography" at the Simons Institute for the Theory of Computing. During this program, researchers visited from all around the world to collaborate on open questions in lattice algorithms and lattice-based cryptography, and to discuss ideas and potential new approaches, until in March 2020 the world went into lockdown, and the program came to an early end.

Mar 2016 - Sep 2017

Postdoctoral Researcher

During my time at the IBM Research lab in Zurich, Switzerland, I studied methods to further improve lattice-based cryptographic solutions, as well as methods that attempt to break these schemes, to get a better understanding of the true security of these lattice-based schemes. I further continued my research on efficient nearest neighbor techniques, which resulted in a nice joint paper on practical and optimal time-space trade-offs.

Oct 2011 - Feb 2016

Doctoral Candidate

In my PhD research, I focused on obtaining a better understanding of, and finding improvements for, various lattice algorithms that lie at the foundation of lattice-based cryptanalysis. Specifically, I focused on lattice sieving methods for the shortest vector problem, and I helped transform sieving from a mostly irrelevant theoretical novelty (2011) to the main algorithm to consider when choosing parameters (2016). The time complexity 20.292n + o(n) from our SODA 2016 paper currently still stands as the asymptotically fastest method for solving the shortest vector problem in high dimensions, while the 20.265n + o(n) from my PhD thesis was long the best quantum complexity for the shortest vector problem, until it was finally improved by Chailloux-Loyer at AsiaCrypt 2021.

Oct 2010 - Jun 2011

Research Intern

To protect copyrighted content against piracy, fingerprints or watermarks are commonly embedded in the content, allowing the distributor of the content to trace a pirate copy to the responsible user. To combat this solution, several pirates may collude, and mix their watermarked copies into a new copy, with a fingerprint which is a mix of the individual pirates' fingerprints. With fingerprinting codes it is possible to find the pirates even if they collude. Various previous solutions were aimed at non-adaptive settings, and during my internship I studied adaptive solutions, leading to the invention of the (patented) dynamic Tardos scheme.


Oct 2020 - Dec 2021

Lichess.org Team Member

Lichess is the second largest online chess site, and each day millions of games are played between users from all around the world. Lichess is free, open-source, ad-free, and exists as a non-profit organization funded solely through donations from users. As a team member I assisted with moderating the chat, finding cheaters, handling ban appeals, developing improved cheat detection tools, scouting and guiding new team members, and outlining the path towards the future for Lichess in terms of policies, governance, goals, vision, and more.


Oct 2011 - Feb 2016

PhD in Cryptography (cum laude)

The research in my PhD at the Eindhoven University of Technology (TU/e) focused on two topics: improving collusion-resistant fingerprinting schemes, and a new direction in lattice sieving algorithms by combining them with nearest neighbor search techniques. Besides the results in these two main topics, I showed how to improve upon the state-of-the-art for group testing and nearest neighbor searching. The resulting PhD thesis titled Search problems in cryptography: From fingerprinting to lattice sieving from December 2015 can be downloaded here.

Sep 2009 - Aug 2011

MSc in Applied Mathematics (cum laude)

I graduated in the group Coding Theory and Cryptology, which is part of the section Discrete Mathematics. In the second year of my Masters I did a final project combined with an internship at Irdeto BV. This internship concluded with writing a Masters thesis, titled Collusion-resistant traitor tracing schemes, which can be downloaded here.

Sep 2006 - Aug 2009

BSc in Applied Mathematics (cum laude)

During the first three years of my studies I took various courses in both Applied Mathematics and in Computer Science. In the first year I obtained propaedeutic diplomas in both Mathematics and Computer Science, and later I also completed a so-called "minor" in Advanced Computer Science. The last part of these three years focused on discrete mathematics, which concluded with a final project and thesis about the Collatz conjecture. This thesis titled The 3n+1 conjecture can be downloaded here.


  • Python
  • C
  • C++
  • Object Pascal
  • Java
  • Haskell
  • HTML
  • PHP
  • SQL
  • CSS
  • JavaScript
  • Mathematica
  • R
  • Matlab
  • Sage
  • Microsoft Office
  • LaTeX
  • Git
  • Dutch
  • English
  • French
  • German




Preprint, 2023

Oblivious graph algorithms for TSP and VRP using FHE and MPC

Sam Leder, Thijs Laarhoven
Preprint, 2023 Preprint, 2023
Designs, Codes and Cryptography 2023

The irreducible vectors of a lattice

Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
Designs, Codes and Cryptography 2023 Designs, Codes and Cryptography 2023
CG 2022

Human and computer decision-making in chess with applications to online cheat detection

Thijs Laarhoven, Aditya Ponukumati
CG 2022 CG 2022
Crypto 2021

Lower bounds for nearest neighbor searching and post-quantum cryptanalysis

Elena Kirshanova, Thijs Laarhoven
Crypto 2021 Crypto 2021
CT-RSA 2021

Dual lattice attacks for closest vector problems (with preprocessing)

Thijs Laarhoven, Michael Walter
CT-RSA 2021 CT-RSA 2021
Journal of Mathematical Cryptology 2020

Approximate Voronoi cells for lattices, revisited

Thijs Laarhoven
Journal of Mathematical Cryptology 2020 Journal of Mathematical Cryptology 2020
ICALP 2020

Polytopes, lattices, and spherical codes for the nearest neighbor problem

Thijs Laarhoven
ICALP 2020 ICALP 2020
AfricaCrypt 2020

Sieve, enumerate, slice, and lift: Hybrid lattice algorithms for SVP via CVPP

Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
AfricaCrypt 2020 AfricaCrypt 2020
ECTA 2019

Evolutionary techniques in lattice sieving algorithms

Thijs Laarhoven
ECTA 2019
Best Paper Award ECTA 2019
IH&MMSec 2019

Nearest neighbor decoding for Tardos fingerprinting codes

Thijs Laarhoven
IH&MMSec 2019 IH&MMSec 2019
PQCrypto 2019

Round5: Compact and fast post-quantum public-key encryption

Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
PQCrypto 2019 PQCrypto 2019
PQCrypto 2019

Finding closest lattice vectors using approximate Voronoi cells

Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
PQCrypto 2019 PQCrypto 2019
SOCG 2018

Graph-based time-space trade-offs for approximate near neighbors

Thijs Laarhoven
SOCG 2018 SOCG 2018
PQCrypto 2018

Progressive lattice sieving

Thijs Laarhoven, Artur Mariano
PQCrypto 2018 PQCrypto 2018
PKC 2018

Speed-ups and time-memory trade-offs for tuple lattice sieving

Gottfried Herold, Elena Kirshanova, Thijs Laarhoven
PKC 2018 PKC 2018
MFCS 2017

Hypercube LSH for approximate near neighbors

Thijs Laarhoven
MFCS 2017 MFCS 2017
PDP 2017

A parallel variant of LDSieve for the SVP on lattices

Artur Mariano, Thijs Laarhoven, Christian Bischof
PDP 2017 PDP 2017
arXiv:1705.02828 [cs.DS] 2017

Faster tuple lattice sieving using spherical locality-sensitive filters

Thijs Laarhoven
arXiv:1705.02828 [cs.DS] 2017 arXiv:1705.02828 [cs.DS] 2017
IEEE Access 2017

A practical view of the state-of-the-art of lattice-based cryptanalysis

Artur Mariano, Thijs Laarhoven, Fábio Correia, Manuel Rodrigues, Gabriel Falcao
IEEE Access 2017 IEEE Access 2017
SODA 2017

Optimal hashing-based time-space trade-offs for approximate near neighbors

Alexandr Andoni, Thijs Laarhoven, Ilya Razenshteyn, Erik Waingarten
SODA 2017
Invited to the ACM Transactions on Algorithms SODA 2017
SAC 2016

Sieving for closest lattice vectors (with preprocessing)

Thijs Laarhoven
SAC 2016 SAC 2016
ANTS 2016

Tuple lattice sieving

Shi Bai, Thijs Laarhoven, Damien Stehlé
ANTS 2016 ANTS 2016
arXiv:1605.02701 [cs.DS] 2016

Lower bounds on time-space trade-offs for approximate near neighbors

Alexandr Andoni, Thijs Laarhoven, Ilya Razenshteyn, Erik Waingarten
arXiv:1605.02701 [cs.DS] 2016 arXiv:1605.02701 [cs.DS] 2016
AfricaCrypt 2016

Efficient (ideal) lattice sieving using cross-polytope LSH

Anja Becker, Thijs Laarhoven
AfricaCrypt 2016 AfricaCrypt 2016
PhD Thesis 2016

Search problems in cryptography

Thijs Laarhoven
PhD Thesis 2016
Graduated cum laude PhD Thesis 2016
SODA 2016

New directions in nearest neighbor searching with applications to lattice sieving

Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven
SODA 2016 SODA 2016
EURASIP Journal on Information Security 2016

Asymptotics of fingerprinting and group testing: Capacity-achieving log-likelihood decoders

Thijs Laarhoven
EURASIP Journal on Information Security 2016 EURASIP Journal on Information Security 2016
arXiv:1511.07527 [cs.DS] 2015

Tradeoffs for nearest neighbors on the sphere

Thijs Laarhoven
arXiv:1511.07527 [cs.DS] 2015 arXiv:1511.07527 [cs.DS] 2015
NeurIPS 2015

Practical and optimal LSH for angular distance

Alexandr Andoni, Piotr Indyk, Thijs Laarhoven, Ilya Razenshteyn, Ludwig Schmidt
NeurIPS 2015 NeurIPS 2015
ICPP 2015

Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP

Artur Mariano, Thijs Laarhoven, Christian Bischof
ICPP 2015 ICPP 2015
LatinCrypt 2015

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Thijs Laarhoven, Benne de Weger
LatinCrypt 2015 LatinCrypt 2015
Crypto 2015

Sieving for shortest vectors in lattices using angular locality-sensitive hashing

Thijs Laarhoven
Crypto 2015 Crypto 2015
IEEE Transactions on Information Forensics and Security 2015

Asymptotics of fingerprinting and group testing: tight bounds from channel capacities

Thijs Laarhoven
IEEE Transactions on Information Forensics and Security 2015 IEEE Transactions on Information Forensics and Security 2015
IH&MMSec 2015

Optimal sequential fingerprinting: Wald vs. Tardos

Thijs Laarhoven
IH&MMSec 2015
Best Paper Award IH&MMSec 2015
Designs, Codes and Cryptography 2015

Finding shortest lattice vectors faster using quantum search

Thijs Laarhoven, Michele Mosca, Joop van de Pol
Designs, Codes and Cryptography 2015 Designs, Codes and Cryptography 2015
IH&MMSec 2014

Capacities and capacity-achieving decoders for various fingerprinting games

Thijs Laarhoven
IH&MMSec 2014
Best Student Paper Award IH&MMSec 2014
Designs, Codes and Cryptography 2014

Optimal symmetric Tardos traitor tracing schemes

Thijs Laarhoven, Benne de Weger
Designs, Codes and Cryptography 2014 Designs, Codes and Cryptography 2014
SPIE 2014

Tuple decoders for traitor tracing schemes

Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
SPIE 2014 SPIE 2014
WIFS 2013

Dynamic traitor tracing schemes, revisited

Thijs Laarhoven
WIFS 2013 WIFS 2013
Allerton 2013

Efficient probabilistic group testing based on traitor tracing

Thijs Laarhoven
Allerton 2013 Allerton 2013
IH&MMSec 2013

Discrete distributions in the Tardos scheme, revisited

Thijs Laarhoven, Benne de Weger
IH&MMSec 2013 IH&MMSec 2013
Indagationes Mathematicae 2013

The Collatz conjecture and De Bruijn graphs

Thijs Laarhoven, Benne de Weger
Indagationes Mathematicae 2013 Indagationes Mathematicae 2013
PQCrypto 2013

Solving the shortest vector problem in lattices faster using quantum search

Thijs Laarhoven, Michele Mosca, Joop van de Pol
PQCrypto 2013 PQCrypto 2013
IEEE Transactions on Information Theory 2013

Dynamic Tardos traitor tracing schemes

Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Škorić, Benne de Weger
IEEE Transactions on Information Theory 2013 IEEE Transactions on Information Theory 2013
WIFS 2012

Dynamic traitor tracing for arbitrary alphabets: Divide and conquer

Thijs Laarhoven, Jan-Jaap Oosterwijk, Jeroen Doumen
WIFS 2012
Best Paper Award WIFS 2012
Patent 2012

Dynamic Tardos traitor tracing schemes

Peter Roelse, Jeroen Doumen, Thijs Laarhoven
Patent 2012 Patent 2012
Cryptology ePrint Archive 2012

Solving hard lattice problems and the security of lattice-based cryptosystems

Thijs Laarhoven, Joop van de Pol, Benne de Weger
Cryptology ePrint Archive 2012 Cryptology ePrint Archive 2012
Master thesis 2011

Collusion-resistant traitor tracing schemes

Thijs Laarhoven
Master thesis 2011
Graduated cum laude Master thesis 2011
Bachelor thesis 2009

The 3n+1 conjecture

Thijs Laarhoven
Bachelor thesis 2009 Bachelor thesis 2009


Work in progress


Work in progress


Work in progress