Suivre
James Howe
Titre
Citée par
Citée par
Année
On practical discrete Gaussian samplers for lattice-based cryptography
J Howe, A Khalid, C Rafferty, F Regazzoni, M O’Neill
IEEE Transactions on Computers 67 (3), 322-334, 2016
692016
Practical Lattice-based Digital Signature Schemes
J Howe, T Poeppelmann, M O’Neill, E O’Sullivan, T Gueneysu
ACM Transactions on Embedded Computing Systems 14, 24, 2015
632015
Standard Lattice-Based Key Encapsulation on Embedded Devices
J Howe, T Oder, M Krausz, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 372-393, 2018
542018
Lattice-based encryption over standard lattices in hardware
J Howe, C Moore, M O'Neill, F Regazzoni, T Güneysu, K Beeden
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
432016
Side-channel Assisted Existential Forgery Attack on Dilithium-A NIST PQC candidate
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
292018
Isochronous Gaussian Sampling: From Inception to Implementation
J Howe, T Prest, T Ricosset, M Rossi
International Conference on Post-Quantum Cryptography, 53-71, 2020
202020
Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
172019
Time-independent discrete Gaussian sampling for post-quantum cryptography
A Khalid, J Howe, C Rafferty, M O'Neill
2016 International Conference on Field-Programmable Technology (FPT), 241-244, 2016
172016
Optimised lattice-based key encapsulation in hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
NIST’s Second PQC Standardization Conference 2019, 13, 2019
142019
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
S McCarthy, J Howe, N Smyth, S Brannigan, M O’Neill
16th International Joint Conference on e-Business and Telecommunications …, 2019
142019
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
J Howe, A Khalid, M Martinoli, F Regazzoni, E Oswald
2019 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2019
142019
Compact, scalable, and efficient discrete Gaussian samplers for lattice-based cryptography
A Khalid, J Howe, C Rafferty, F Regazzoni, M O'Neill
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
122018
SoK: How (not) to Design and Implement Post-Quantum Cryptography
J Howe, T Prest, D Apon
CT-RSA 2021, 2021
82021
Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography
S Fan, W Liu, J Howe, A Khalid, M O’Neill
IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2018, 2018
72018
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
Journal of Cryptographic Engineering, 2021
62021
Compact and provably secure lattice-based signatures in hardware
J Howe, C Rafferty, A Khalid, M O'Neill
2017 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2017
62017
Lattice-based Key-sharing Schemes: A Survey
P Ravi, J Howe, A Chattopadhyay, S Bhasin
ACM Computing Surveys (CSUR) 54 (1), 1-39, 2021
52021
Error samplers for lattice-based cryptography-challenges, vulnerabilities and solutions
A Khalid, C Rafferty, J Howe, S Brannigan, W Liu, M O’Neill
2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 411-414, 2018
32018
Secure architectures of future emerging cryptography SAFEcrypto
M O'Neill, E O'Sullivan, G McWilliams, MJ Saarinen, C Moore, A Khalid, ...
Proceedings of the ACM International Conference on Computing Frontiers, 315-322, 2016
32016
Attacks on NIST PQC 3rd Round Candidates
D Apon, J Howe
IACR Real World Crypto Symposium 10, 2021
22021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20