BibTeX records: Joppe W. Bos

download as .bib file

@article{DBLP:journals/csur/MannWCB24,
  author       = {Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann and
                  Christian Weinert and
                  Daphnee Chabal and
                  Joppe W. Bos},
  title        = {Towards Practical Secure Neural Network Inference: The Journey So
                  Far and the Road Ahead},
  journal      = {{ACM} Comput. Surv.},
  volume       = {56},
  number       = {5},
  pages        = {117:1--117:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3628446},
  doi          = {10.1145/3628446},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/MannWCB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BosBCRVV23,
  author       = {Joppe W. Bos and
                  Olivier Bronchain and
                  Frank Custers and
                  Joost Renes and
                  Denise Verbakel and
                  Christine van Vredendaal},
  title        = {Enabling FrodoKEM on Embedded Devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {74--96},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.74-96},
  doi          = {10.46586/TCHES.V2023.I3.74-96},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BosBCRVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/MiteloudiBBFR23,
  author       = {Konstantina Miteloudi and
                  Joppe W. Bos and
                  Olivier Bronchain and
                  Bj{\"{o}}rn Fay and
                  Joost Renes},
  editor       = {Shivam Bhasin and
                  Thomas Roche},
  title        = {{PQ.V.ALU.E:} Post-quantum {RISC-V} Custom {ALU} Extensions on Dilithium
                  and Kyber},
  booktitle    = {Smart Card Research and Advanced Applications - 22nd International
                  Conference, {CARDIS} 2023, Amsterdam, The Netherlands, November 14-16,
                  2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14530},
  pages        = {190--209},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54409-5\_10},
  doi          = {10.1007/978-3-031-54409-5\_10},
  timestamp    = {Tue, 05 Mar 2024 11:32:26 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/MiteloudiBBFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-08277,
  author       = {Joppe W. Bos and
                  Kevin S. McCurley},
  title        = {LaTeX, metadata, and publishing workflows},
  journal      = {CoRR},
  volume       = {abs/2301.08277},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.08277},
  doi          = {10.48550/ARXIV.2301.08277},
  eprinttype    = {arXiv},
  eprint       = {2301.08277},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-08277.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosBCRVV23,
  author       = {Joppe W. Bos and
                  Olivier Bronchain and
                  Frank Custers and
                  Joost Renes and
                  Denise Verbakel and
                  Christine van Vredendaal},
  title        = {Enabling FrodoKEM on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/158},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BosBCRVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosDKR23,
  author       = {Joppe W. Bos and
                  Alexander Dima and
                  Alexander Kiening and
                  Joost Renes},
  title        = {Post-Quantum Secure Over-the-Air Update of Automotive Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {965},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/965},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosDKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiteloudiBBFR23,
  author       = {Konstantina Miteloudi and
                  Joppe W. Bos and
                  Olivier Bronchain and
                  Bj{\"{o}}rn Fay and
                  Joost Renes},
  title        = {{PQ.V.ALU.E:} Post-Quantum {RISC-V} Custom {ALU} Extensions on Dilithium
                  and Kyber},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1505},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1505},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiteloudiBBFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BosRS22,
  author       = {Joppe W. Bos and
                  Joost Renes and
                  Amber Sprenkels},
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {Dilithium for Memory Constrained Devices},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  pages        = {217--235},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9\_10},
  doi          = {10.1007/978-3-031-17433-9\_10},
  timestamp    = {Sun, 10 Dec 2023 00:28:26 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BosRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BosRV22,
  author       = {Joppe W. Bos and
                  Joost Renes and
                  Christine van Vredendaal},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Post-Quantum Cryptography with Contemporary Co-Processors: Beyond
                  Kronecker, Sch{\"{o}}nhage-Strassen {\&} Nussbaumer},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3683--3697},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/bos},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BosRV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosRS22,
  author       = {Joppe W. Bos and
                  Joost Renes and
                  Amber Sprenkels},
  title        = {Dilithium for Memory Constrained Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/323},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BosRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCRRSW22,
  author       = {Joppe W. Bos and
                  Brian Carlson and
                  Joost Renes and
                  Marius Rotaru and
                  Amber Sprenkels and
                  Geoffrey P. Waters},
  title        = {Post-Quantum Secure Boot on Vehicle Network Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/635},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCRRSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MannWCB22,
  author       = {Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann and
                  Christian Weinert and
                  Daphnee Chabal and
                  Joppe W. Bos},
  title        = {Towards Practical Secure Neural Network Inference: The Journey So
                  Far and the Road Ahead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1483},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1483},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MannWCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BosHRV21,
  author       = {Joppe W. Bos and
                  Andreas H{\"{u}}lsing and
                  Joost Renes and
                  Christine van Vredendaal},
  title        = {Rapidly Verifiable {XMSS} Signatures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {137--168},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.137-168},
  doi          = {10.46586/TCHES.V2021.I1.137-168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BosHRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BosGRSV21,
  author       = {Joppe W. Bos and
                  Marc Gourjon and
                  Joost Renes and
                  Tobias Schneider and
                  Christine van Vredendaal},
  title        = {Masking Kyber: First- and Higher-Order Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {173--214},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.173-214},
  doi          = {10.46586/TCHES.V2021.I4.173-214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BosGRSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BosORSV21,
  author       = {Joppe W. Bos and
                  Maximilian Ofner and
                  Joost Renes and
                  Tobias Schneider and
                  Christine van Vredendaal},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {The Matrix Reloaded: Multiplication Strategies in FrodoKEM},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {72--91},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_5},
  doi          = {10.1007/978-3-030-92548-2\_5},
  timestamp    = {Tue, 14 Dec 2021 17:56:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/BosORSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgteurope/Palacios-Garcia21,
  author       = {Emilio J. Palacios{-}Garc{\'{\i}}a and
                  Joppe W. Bos and
                  Xavier Carpent and
                  Geert Deconinck},
  title        = {A privacy-friendly aggregation algorithm for demand side management
                  of residential loads},
  booktitle    = {{IEEE} {PES} Innovative Smart Grid Technologies Europe, {ISGT} Europe
                  2021, Espoo, Finland, October 18-21, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISGTEurope52324.2021.9640201},
  doi          = {10.1109/ISGTEUROPE52324.2021.9640201},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isgteurope/Palacios-Garcia21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosGRSV21,
  author       = {Joppe W. Bos and
                  Marc Gourjon and
                  Joost Renes and
                  Tobias Schneider and
                  Christine van Vredendaal},
  title        = {Masking Kyber: First- and Higher-Order Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/483},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosGRSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosORSV21,
  author       = {Joppe W. Bos and
                  Maximilian Ofner and
                  Joost Renes and
                  Tobias Schneider and
                  Christine van Vredendaal},
  title        = {The Matrix Reloaded: Multiplication Strategies in FrodoKEM},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/711},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosORSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosKP21,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Dan Page},
  title        = {Efficient Modular Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1151},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1151},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BosF20,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Faster modular arithmetic for isogeny-based crypto on embedded devices},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {97--109},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00214-6},
  doi          = {10.1007/S13389-019-00214-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BosF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHRV20,
  author       = {Joppe W. Bos and
                  Andreas H{\"{u}}lsing and
                  Joost Renes and
                  Christine van Vredendaal},
  title        = {Rapidly Verifiable {XMSS} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {898},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/898},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosRV20,
  author       = {Joppe W. Bos and
                  Joost Renes and
                  Christine van Vredendaal},
  title        = {Polynomial Multiplication with Contemporary Co-Processors: Beyond
                  Kronecker, Sch{\"{o}}nhage-Strassen {\&} Nussbaumer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1303},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1303},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BosRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BockBBHMMGTT19,
  author       = {Estuardo Alpirez Bock and
                  Joppe W. Bos and
                  Chris Brzuska and
                  Charles Hubain and
                  Wil Michiels and
                  Cristofaro Mune and
                  Eloi Sanfelix Gonzalez and
                  Philippe Teuwen and
                  Alexander Treff},
  title        = {White-Box Cryptography: Don't Forget About Grey-Box Attacks},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1095--1143},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09315-1},
  doi          = {10.1007/S00145-019-09315-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BockBBHMMGTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BosF19,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Arithmetic Considerations for Isogeny-Based Cryptography},
  journal      = {{IEEE} Trans. Computers},
  volume       = {68},
  number       = {7},
  pages        = {979--990},
  year         = {2019},
  url          = {https://doi.org/10.1109/TC.2018.2851238},
  doi          = {10.1109/TC.2018.2851238},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/BosF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BockABBM19,
  author       = {Estuardo Alpirez Bock and
                  Alessandro Amadori and
                  Joppe W. Bos and
                  Chris Brzuska and
                  Wil Michiels},
  editor       = {Mitsuru Matsui},
  title        = {Doubly Half-Injective PRGs for Incompressible White-Box Cryptography},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {189--209},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_10},
  doi          = {10.1007/978-3-030-12612-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BockABBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockABBM19,
  author       = {Estuardo Alpirez Bock and
                  Alessandro Amadori and
                  Joppe W. Bos and
                  Chris Brzuska and
                  Wil Michiels},
  title        = {Doubly half-injective PRGs for incompressible white-box cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockABBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AmbroseBFJLM18,
  author       = {Christopher Ambrose and
                  Joppe W. Bos and
                  Bj{\"{o}}rn Fay and
                  Marc Joye and
                  Manfred Lochter and
                  Bruce Murray},
  editor       = {Nigel P. Smart},
  title        = {Differential Attacks on Deterministic Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_18},
  doi          = {10.1007/978-3-319-76953-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AmbroseBFJLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BosDKLLSSSS18,
  author       = {Joppe W. Bos and
                  L{\'{e}}o Ducas and
                  Eike Kiltz and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  John M. Schanck and
                  Peter Schwabe and
                  Gregor Seiler and
                  Damien Stehl{\'{e}}},
  title        = {{CRYSTALS} - Kyber: {A} CCA-Secure Module-Lattice-Based {KEM}},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {353--367},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00032},
  doi          = {10.1109/EUROSP.2018.00032},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BosDKLLSSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BosFMOS18,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Assessing the Feasibility of Single Trace Power Analysis of Frodo},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {216--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_10},
  doi          = {10.1007/978-3-030-10970-7\_10},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BosFMOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosF18,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Arithmetic Considerations for Isogeny Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosFMOS18,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Assessing the Feasibility of Single Trace Power Analysis of Frodo},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosFMOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosF18a,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {792},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/792},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosF18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosFMOS18a,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Fly, you fool! Faster Frodo for the {ARM} Cortex-M4},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosFMOS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BosNP17,
  author       = {Joppe W. Bos and
                  Michael Naehrig and
                  Joop van de Pol},
  title        = {Sieving for shortest vectors in ideal lattices: a practical perspective},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {313--329},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010312},
  doi          = {10.1504/IJACT.2017.10010312},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BosNP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BottinelliB17,
  author       = {Paul Bottinelli and
                  Joppe W. Bos},
  title        = {Computational aspects of correlation power analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {167--181},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0122-9},
  doi          = {10.1007/S13389-016-0122-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BottinelliB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BosCIV17,
  author       = {Joppe W. Bos and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  editor       = {Marc Joye and
                  Abderrahmane Nitaj},
  title        = {Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic
                  Encryption and the Group Method of Data Handling},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
                  on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10239},
  pages        = {184--201},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57339-7\_11},
  doi          = {10.1007/978-3-319-57339-7\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BosCIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/BosF17,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  editor       = {Neil Burgess and
                  Javier D. Bruguera and
                  Florent de Dinechin},
  title        = {Fast Arithmetic Modulo 2\({}^{\mbox{x}}\) p\({}^{\mbox{y}}\) {\(\pm\)}
                  1},
  booktitle    = {24th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2017, London,
                  United Kingdom, July 24-26, 2017},
  pages        = {148--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ARITH.2017.15},
  doi          = {10.1109/ARITH.2017.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/BosF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BonteBBCIV17,
  author       = {Charlotte Bonte and
                  Carl Bootland and
                  Joppe W. Bos and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Faster Homomorphic Function Evaluation Using Non-integral Base Encoding},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {579--600},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_28},
  doi          = {10.1007/978-3-319-66787-4\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BonteBBCIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonteBBCIV17,
  author       = {Charlotte Bonte and
                  Carl Bootland and
                  Joppe W. Bos and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Faster Homomorphic Function Evaluation using Non-Integral Base Encoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonteBBCIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHMMGT17,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Cristofaro Mune and
                  Eloi Sanfelix Gonzalez and
                  Philippe Teuwen},
  title        = {White-Box Cryptography: Don't Forget About Grey Box Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHMMGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosDKLLSSS17,
  author       = {Joppe W. Bos and
                  L{\'{e}}o Ducas and
                  Eike Kiltz and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  John M. Schanck and
                  Peter Schwabe and
                  Damien Stehl{\'{e}}},
  title        = {{CRYSTALS} - Kyber: a CCA-secure module-lattice-based {KEM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosDKLLSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbroseBFJLM17,
  author       = {Christopher Ambrose and
                  Joppe W. Bos and
                  Bj{\"{o}}rn Fay and
                  Marc Joye and
                  Manfred Lochter and
                  Bruce Murray},
  title        = {Differential Attacks on Deterministic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbroseBFJLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosM17,
  author       = {Joppe W. Bos and
                  Peter L. Montgomery},
  title        = {Montgomery Arithmetic from a Software Perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BosCLN16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Patrick Longa and
                  Michael Naehrig},
  title        = {Selecting elliptic curves for cryptography: an efficiency and security
                  analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {4},
  pages        = {259--286},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0097-y},
  doi          = {10.1007/S13389-015-0097-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/BosCLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BosCHL16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Kristin E. Lauter},
  title        = {Fast Cryptography in Genus 2},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {1},
  pages        = {28--60},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-014-9188-7},
  doi          = {10.1007/S00145-014-9188-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BosCHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BosCDMNNRS16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  L{\'{e}}o Ducas and
                  Ilya Mironov and
                  Michael Naehrig and
                  Valeria Nikolaenko and
                  Ananth Raghunathan and
                  Douglas Stebila},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from
                  {LWE}},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1006--1018},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978425},
  doi          = {10.1145/2976749.2978425},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BosCDMNNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosHMT16,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Philippe Teuwen},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Differential Computation Analysis: Hiding Your White-Box Designs is
                  Not Enough},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {215--236},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_11},
  doi          = {10.1007/978-3-662-53140-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BosHMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/BosM16,
  author       = {Joppe W. Bos and
                  Wil Michiels},
  title        = {Security Assessment of Software Security: {A} Closer Look at White-Box
                  Cryptographic Implementations},
  journal      = {{ERCIM} News},
  volume       = {2016},
  number       = {106},
  year         = {2016},
  url          = {http://ercim-news.ercim.eu/en106/special/security-assessment-of-software-security-a-closer-look-at-white-box-cryptographic-implementations},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/BosM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCDMNNRS16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  L{\'{e}}o Ducas and
                  Ilya Mironov and
                  Michael Naehrig and
                  Valeria Nikolaenko and
                  Ananth Raghunathan and
                  Douglas Stebila},
  title        = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCDMNNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosF16,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Fast Arithmetic Modulo 2\({}^{\mbox{xp\({}^{\mbox{y{\(\pm\)}}}\)}}\)
                  1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/986},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCIV16,
  author       = {Joppe W. Bos and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Privacy-friendly Forecasting for the Smart Grid using Homomorphic
                  Encryption and the Group Method of Data Handling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1117},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCIV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BosCNS15,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Michael Naehrig and
                  Douglas Stebila},
  title        = {Post-Quantum Key Exchange for the {TLS} Protocol from the Ring Learning
                  with Errors Problem},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {553--570},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.40},
  doi          = {10.1109/SP.2015.40},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BosCNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BottinelliB15,
  author       = {Paul Bottinelli and
                  Joppe W. Bos},
  title        = {Computational Aspects of Correlation Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BottinelliB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHMT15,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Philippe Teuwen},
  title        = {Differential Computation Analysis: Hiding your White-Box Designs is
                  Not Enough},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbi/BosLN14,
  author       = {Joppe W. Bos and
                  Kristin E. Lauter and
                  Michael Naehrig},
  title        = {Private predictive analysis on encrypted medical data},
  journal      = {J. Biomed. Informatics},
  volume       = {50},
  pages        = {234--243},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jbi.2014.04.003},
  doi          = {10.1016/J.JBI.2014.04.003},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbi/BosLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Bos14,
  author       = {Joppe W. Bos},
  title        = {Constant time modular inversion},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {275--281},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0084-8},
  doi          = {10.1007/S13389-014-0084-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Bos14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BosDJ14,
  author       = {Joppe W. Bos and
                  Alina Dudeanu and
                  Dimitar Jetchev},
  title        = {Collision bounds for the additive Pollard rho algorithm for solving
                  discrete logarithms},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {71--92},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0032},
  doi          = {10.1515/JMC-2012-0032},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BosDJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KleinjungBL14,
  author       = {Thorsten Kleinjung and
                  Joppe W. Bos and
                  Arjen K. Lenstra},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Mersenne Factorization Factory},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {358--377},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_19},
  doi          = {10.1007/978-3-662-45611-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KleinjungBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MieleBKL14,
  author       = {Andrea Miele and
                  Joppe W. Bos and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Cofactorization on Graphics Processing Units},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {335--352},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_19},
  doi          = {10.1007/978-3-662-44709-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MieleBKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BosHHMNW14,
  author       = {Joppe W. Bos and
                  J. Alex Halderman and
                  Nadia Heninger and
                  Jonathan Moore and
                  Michael Naehrig and
                  Eric Wustrow},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Elliptic Curve Cryptography in Practice},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {157--175},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_11},
  doi          = {10.1007/978-3-662-45472-5\_11},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BosHHMNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BosCM14,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Andrea Miele},
  editor       = {Hugo Krawczyk},
  title        = {Elliptic and Hyperelliptic Curves: {A} Practical Security Analysis},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_12},
  doi          = {10.1007/978-3-642-54631-0\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BosCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCLN14,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Patrick Longa and
                  Michael Naehrig},
  title        = {Selecting Elliptic Curves for Cryptography: An Efficiency and Security
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosLN14,
  author       = {Joppe W. Bos and
                  Kristin E. Lauter and
                  Michael Naehrig},
  title        = {Private Predictive Analysis on Encrypted Medical Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MieleBKL14,
  author       = {Andrea Miele and
                  Joppe W. Bos and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra},
  title        = {Cofactorization on Graphics Processing Units},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MieleBKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCNS14,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Michael Naehrig and
                  Douglas Stebila},
  title        = {Post-quantum key exchange for the {TLS} protocol from the ring learning
                  with errors problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinjungBL14a,
  author       = {Thorsten Kleinjung and
                  Joppe W. Bos and
                  Arjen K. Lenstra},
  title        = {Mersenne factorization factory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinjungBL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosNP14,
  author       = {Joppe W. Bos and
                  Michael Naehrig and
                  Joop van de Pol},
  title        = {Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/880},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosCHL13,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Kristin E. Lauter},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {High-Performance Scalar Multiplication Using 8-Dimensional {GLV/GLS}
                  Decomposition},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {331--348},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_19},
  doi          = {10.1007/978-3-642-40349-1\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BosCHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BosCHL13,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Kristin E. Lauter},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Fast Cryptography in Genus 2},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {194--210},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_12},
  doi          = {10.1007/978-3-642-38348-9\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BosCHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BosLLN13,
  author       = {Joppe W. Bos and
                  Kristin E. Lauter and
                  Jake Loftus and
                  Michael Naehrig},
  editor       = {Martijn Stam},
  title        = {Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_4},
  doi          = {10.1007/978-3-642-45239-0\_4},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BosLLN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BosCN13,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Michael Naehrig},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Exponentiating in Pairing Groups},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {438--455},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_22},
  doi          = {10.1007/978-3-662-43414-7\_22},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BosCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BosMSZ13,
  author       = {Joppe W. Bos and
                  Peter L. Montgomery and
                  Daniel Shumow and
                  Gregory M. Zaverucha},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Montgomery Multiplication Using Vector Instructions},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {471--489},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_24},
  doi          = {10.1007/978-3-662-43414-7\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BosMSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosLLN13,
  author       = {Joppe W. Bos and
                  Kristin E. Lauter and
                  Jake Loftus and
                  Michael Naehrig},
  title        = {Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosLLN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCHL13,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Kristin E. Lauter},
  title        = {High-Performance Scalar Multiplication using 8-Dimensional {GLV/GLS}
                  Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCN13,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Michael Naehrig},
  title        = {Exponentiating in Pairing Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosMSZ13,
  author       = {Joppe W. Bos and
                  Peter L. Montgomery and
                  Daniel Shumow and
                  Gregory M. Zaverucha},
  title        = {Montgomery Multiplication Using Vector Instructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/519},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosMSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCM13,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Andrea Miele},
  title        = {Elliptic and Hyperelliptic Curves: a Practical Security Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHHMNW13,
  author       = {Joppe W. Bos and
                  J. Alex Halderman and
                  Nadia Heninger and
                  Jonathan Moore and
                  Michael Naehrig and
                  Eric Wustrow},
  title        = {Elliptic Curve Cryptography in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/734},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHHMNW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ch/Bos12,
  author       = {Joppe W. Bos},
  title        = {On the Cryptanalysis of Public-Key Cryptography},
  school       = {EPFL, Switzerland},
  year         = {2012},
  url          = {https://doi.org/10.5075/epfl-thesis-5291},
  doi          = {10.5075/EPFL-THESIS-5291},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ch/Bos12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/KleinjungBLOACFTJTLMTS12,
  author       = {Thorsten Kleinjung and
                  Joppe W. Bos and
                  Arjen K. Lenstra and
                  Dag Arne Osvik and
                  Kazumaro Aoki and
                  Scott Contini and
                  Jens Franke and
                  Emmanuel Thom{\'{e}} and
                  Pascal Jermini and
                  Michela Thi{\'{e}}mard and
                  Paul C. Leyland and
                  Peter L. Montgomery and
                  Andrey Timofeev and
                  Heinz Stockinger},
  title        = {A heterogeneous computing environment to solve the 768-bit {RSA} challenge},
  journal      = {Clust. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {53--68},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10586-010-0149-0},
  doi          = {10.1007/S10586-010-0149-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/KleinjungBLOACFTJTLMTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BosKKLM12,
  author       = {Joppe W. Bos and
                  Marcelo E. Kaihara and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Peter L. Montgomery},
  title        = {Solving a 112-bit prime elliptic curve discrete logarithm problem
                  on game consoles using sloppy reduction},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {212--228},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.045590},
  doi          = {10.1504/IJACT.2012.045590},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BosKKLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/Bos12,
  author       = {Joppe W. Bos},
  title        = {Low-Latency Elliptic Curve Scalar Multiplication},
  journal      = {Int. J. Parallel Program.},
  volume       = {40},
  number       = {5},
  pages        = {532--550},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10766-012-0198-5},
  doi          = {10.1007/S10766-012-0198-5},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpp/Bos12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BosK12,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {{ECM} at Work},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {467--484},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_29},
  doi          = {10.1007/978-3-642-34961-4\_29},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BosK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LenstraHABKW12,
  author       = {Arjen K. Lenstra and
                  James P. Hughes and
                  Maxime Augier and
                  Joppe W. Bos and
                  Thorsten Kleinjung and
                  Christophe Wachter},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Public Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {626--642},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_37},
  doi          = {10.1007/978-3-642-32009-5\_37},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LenstraHABKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-4285,
  author       = {Razvan Barbulescu and
                  Joppe W. Bos and
                  Cyril Bouvier and
                  Thorsten Kleinjung and
                  Peter L. Montgomery},
  title        = {Finding ECM-Friendly Curves through a Study of Galois Properties},
  journal      = {CoRR},
  volume       = {abs/1202.4285},
  year         = {2012},
  url          = {http://arxiv.org/abs/1202.4285},
  eprinttype    = {arXiv},
  eprint       = {1202.4285},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-4285.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LenstraHABKW12,
  author       = {Arjen K. Lenstra and
                  James P. Hughes and
                  Maxime Augier and
                  Joppe W. Bos and
                  Thorsten Kleinjung and
                  Christophe Wachter},
  title        = {Ron was wrong, Whit is right},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/064},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LenstraHABKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuBBKM12,
  author       = {Razvan Barbulescu and
                  Joppe W. Bos and
                  Cyril Bouvier and
                  Thorsten Kleinjung and
                  Peter L. Montgomery},
  title        = {Finding ECM-Friendly Curves through a Study of Galois Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuBBKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosDJ12,
  author       = {Joppe W. Bos and
                  Alina Dudeanu and
                  Dimitar Jetchev},
  title        = {Collision Bounds for the Additive Pollard Rho Algorithm for Solving
                  Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosDJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosK12,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung},
  title        = {{ECM} at Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCHL12,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Kristin E. Lauter},
  title        = {Two is Greater than One},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/BosKLM10,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Peter L. Montgomery},
  editor       = {Elisardo Antelo and
                  David Hough and
                  Paolo Ienne},
  title        = {Efficient {SIMD} Arithmetic Modulo a Mersenne Number},
  booktitle    = {20th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2011, T{\"{u}}bingen,
                  Germany, 25-27 July 2011},
  pages        = {213--221},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARITH.2011.37},
  doi          = {10.1109/ARITH.2011.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/BosKLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosOS11,
  author       = {Joppe W. Bos and
                  Onur {\"{O}}zen and
                  Martijn Stam},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Efficient Hashing Using the {AES} Instruction Set},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {507--522},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_33},
  doi          = {10.1007/978-3-642-23951-9\_33},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BosOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BosKNS10,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Ruben Niederhagen and
                  Peter Schwabe},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {{ECC2K-130} on Cell CPUs},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {225--242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_14},
  doi          = {10.1007/978-3-642-12678-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BosKNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/BosKL10,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra},
  editor       = {Guillaume Hanrot and
                  Fran{\c{c}}ois Morain and
                  Emmanuel Thom{\'{e}}},
  title        = {On the Use of the Negation Map in the Pollard Rho Method},
  booktitle    = {Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy,
                  France, July 19-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6197},
  pages        = {66--82},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14518-6\_9},
  doi          = {10.1007/978-3-642-14518-6\_9},
  timestamp    = {Thu, 14 Oct 2021 10:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/BosKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosS10,
  author       = {Joppe W. Bos and
                  Deian Stefan},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Performance Analysis of the {SHA-3} Candidates on Exotic Multi-core
                  Architectures},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {279--293},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_19},
  doi          = {10.1007/978-3-642-15031-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BosS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KleinjungAFLTBGKMORTZ10,
  author       = {Thorsten Kleinjung and
                  Kazumaro Aoki and
                  Jens Franke and
                  Arjen K. Lenstra and
                  Emmanuel Thom{\'{e}} and
                  Joppe W. Bos and
                  Pierrick Gaudry and
                  Alexander Kruppa and
                  Peter L. Montgomery and
                  Dag Arne Osvik and
                  Herman J. J. te Riele and
                  Andrey Timofeev and
                  Paul Zimmermann},
  editor       = {Tal Rabin},
  title        = {Factorization of a 768-Bit {RSA} Modulus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {333--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_18},
  doi          = {10.1007/978-3-642-14623-7\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KleinjungAFLTBGKMORTZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OsvikBSC10,
  author       = {Dag Arne Osvik and
                  Joppe W. Bos and
                  Deian Stefan and
                  David Canright},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Fast Software {AES} Encryption},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_5},
  doi          = {10.1007/978-3-642-13858-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OsvikBSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/Bos10,
  author       = {Joppe W. Bos},
  editor       = {M. Anwar Hasan and
                  Tor Helleseth},
  title        = {High-Performance Modular Multiplication on the Cell Processor},
  booktitle    = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI}
                  2010, Istanbul, Turkey, June 27-30, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6087},
  pages        = {7--24},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13797-6\_2},
  doi          = {10.1007/978-3-642-13797-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/Bos10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinjungAFLTBGKMORTZ10,
  author       = {Thorsten Kleinjung and
                  Kazumaro Aoki and
                  Jens Franke and
                  Arjen K. Lenstra and
                  Emmanuel Thom{\'{e}} and
                  Joppe W. Bos and
                  Pierrick Gaudry and
                  Alexander Kruppa and
                  Peter L. Montgomery and
                  Dag Arne Osvik and
                  Herman J. J. te Riele and
                  Andrey Timofeev and
                  Paul Zimmermann},
  title        = {Factorization of a 768-bit {RSA} modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinjungAFLTBGKMORTZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosKNS10,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Ruben Niederhagen and
                  Peter Schwabe},
  title        = {{ECC2K-130} on Cell CPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosKNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosKLM10,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Peter L. Montgomery},
  title        = {Efficient {SIMD} arithmetic modulo a Mersenne number},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosKLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosOS10,
  author       = {Joppe W. Bos and
                  Onur {\"{O}}zen and
                  Martijn Stam},
  title        = {Efficient Hashing using the {AES} Instruction Set},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/576},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BosOH09,
  author       = {Joppe W. Bos and
                  Onur {\"{O}}zen and
                  Jean{-}Pierre Hubaux},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Analysis and Optimization of Cryptographically Generated Addresses},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_2},
  doi          = {10.1007/978-3-642-04474-8\_2},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/BosOH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppam/BosK09,
  author       = {Joppe W. Bos and
                  Marcelo E. Kaihara},
  editor       = {Roman Wyrzykowski and
                  Jack J. Dongarra and
                  Konrad Karczewski and
                  Jerzy Wasniewski},
  title        = {Montgomery Multiplication on the Cell},
  booktitle    = {Parallel Processing and Applied Mathematics, 8th International Conference,
                  {PPAM} 2009, Wroclaw, Poland, September 13-16, 2009. Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6067},
  pages        = {477--485},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14390-8\_50},
  doi          = {10.1007/978-3-642-14390-8\_50},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/ppam/BosK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosKKLM09,
  author       = {Joppe W. Bos and
                  Marcelo E. Kaihara and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Peter L. Montgomery},
  title        = {On the Security of 1024-bit {RSA} and 160-bit Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosKKLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09,
  author       = {Daniel V. Bailey and
                  Brian Baldwin and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel},
  title        = {The Certicom Challenges {ECC2-X}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosOS09,
  author       = {Joppe W. Bos and
                  Dag Arne Osvik and
                  Deian Stefan},
  title        = {Fast Implementations of {AES} on Various Platforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09,
  author       = {Daniel V. Bailey and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Luis J. Dominguez Perez and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Ruben Niederhagen and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel and
                  Anthony Van Herrewege and
                  Bo{-}Yin Yang},
  title        = {Breaking {ECC2K-130}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics