Suivre
Joppe W. Bos
Joppe W. Bos
Cryptographic Researcher, NXP Semiconductors, Leuven, Belgium
Adresse e-mail validée de nxp.com - Page d'accueil
Titre
Citée par
Citée par
Année
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 353-367, 2018
8182018
Factorization of a 768-bit RSA modulus
T Kleinjung, K Aoki, J Franke, AK Lenstra, E Thomé, JW Bos, P Gaudry, ...
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
6882010
Improved security for a ring-based fully homomorphic encryption scheme
JW Bos, K Lauter, J Loftus, M Naehrig
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
5722013
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
4722016
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
JW Bos, C Costello, M Naehrig, D Stebila
2015 IEEE Symposium on Security and Privacy, 553-570, 2015
4702015
Elliptic Curve Cryptography in Practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
Financial Cryptography and Data Security, 2013
3692013
Public keys
AK Lenstra, JP Hughes, M Augier, JW Bos, T Kleinjung, C Wachter
Annual Cryptology Conference, 626-642, 2012
365*2012
Private Predictive Analysis on Encrypted Medical Data
JW Bos, K Lauter, M Naehrig
Journal of Biomedical Informatics, 2014
3472014
CRYSTALS-Kyber algorithm specifications and supporting documentation
R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
NIST PQC Round 2 (4), 1-43, 2019
2752019
Fast software AES encryption
DA Osvik, JW Bos, D Stefan, D Canright
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
260*2010
Differential computation analysis: Hiding your white-box designs is not enough
JW Bos, C Hubain, W Michiels, P Teuwen
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1552016
Crystals-kyber
P Schwabe, R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, ...
National Institute of Standards and Technology, Tech. Rep, 2020
1422020
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
JW Bos, C Costello, P Longa, M Naehrig
1372014
Fast cryptography in genus 2
JW Bos, C Costello, H Hisil, K Lauter
Journal of Cryptology 29, 28-60, 2016
1092016
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
J Bos, M Kaihara, T Kleinjung, AK Lenstra, PL Montgomery
1092009
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction
JW Bos, ME Kaihara, T Kleinjung, AK Lenstra, PL Montgomery
International Journal of Applied Cryptography 2 (3), 212-228, 2012
922012
Masking kyber: First-and higher-order implementations
JW Bos, MO Gourjon, J Renes, T Schneider, C Vredendaal
IACR Transactions on Cryptographic Hardware and Embedded Systems 2021 (4 …, 2021
912021
NewHope algorithm specifications and supporting documentation
E Alkim, R Avanzi, J Bos, L Ducas, A de la Piedra, T Pöppelmann, ...
NIST PQC Round 2 (4), 11, 2019
782019
FrodoKEM
M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ...
National Institute of Standards and Technology (2017), 2017
772017
Managed secure computations on encrypted data
JJ Loftus, M Naehrig, JW Bos, KE Lauter
US Patent 9,306,738, 2016
772016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20