Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Joppe W. Bos
@article{DBLP:journals/csur/MannWCB24, author = {Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann and Christian Weinert and Daphnee Chabal and Joppe W. Bos}, title = {Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead}, journal = {{ACM} Comput. Surv.}, volume = {56}, number = {5}, pages = {117:1--117:37}, year = {2024}, url = {https://doi.org/10.1145/3628446}, doi = {10.1145/3628446}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MannWCB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BosBCRVV23, author = {Joppe W. Bos and Olivier Bronchain and Frank Custers and Joost Renes and Denise Verbakel and Christine van Vredendaal}, title = {Enabling FrodoKEM on Embedded Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {74--96}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.74-96}, doi = {10.46586/TCHES.V2023.I3.74-96}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BosBCRVV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/MiteloudiBBFR23, author = {Konstantina Miteloudi and Joppe W. Bos and Olivier Bronchain and Bj{\"{o}}rn Fay and Joost Renes}, editor = {Shivam Bhasin and Thomas Roche}, title = {{PQ.V.ALU.E:} Post-quantum {RISC-V} Custom {ALU} Extensions on Dilithium and Kyber}, booktitle = {Smart Card Research and Advanced Applications - 22nd International Conference, {CARDIS} 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14530}, pages = {190--209}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54409-5\_10}, doi = {10.1007/978-3-031-54409-5\_10}, timestamp = {Tue, 05 Mar 2024 11:32:26 +0100}, biburl = {https://dblp.org/rec/conf/cardis/MiteloudiBBFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-08277, author = {Joppe W. Bos and Kevin S. McCurley}, title = {LaTeX, metadata, and publishing workflows}, journal = {CoRR}, volume = {abs/2301.08277}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.08277}, doi = {10.48550/ARXIV.2301.08277}, eprinttype = {arXiv}, eprint = {2301.08277}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-08277.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosBCRVV23, author = {Joppe W. Bos and Olivier Bronchain and Frank Custers and Joost Renes and Denise Verbakel and Christine van Vredendaal}, title = {Enabling FrodoKEM on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2023}, url = {https://eprint.iacr.org/2023/158}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BosBCRVV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosDKR23, author = {Joppe W. Bos and Alexander Dima and Alexander Kiening and Joost Renes}, title = {Post-Quantum Secure Over-the-Air Update of Automotive Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {965}, year = {2023}, url = {https://eprint.iacr.org/2023/965}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosDKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiteloudiBBFR23, author = {Konstantina Miteloudi and Joppe W. Bos and Olivier Bronchain and Bj{\"{o}}rn Fay and Joost Renes}, title = {{PQ.V.ALU.E:} Post-Quantum {RISC-V} Custom {ALU} Extensions on Dilithium and Kyber}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1505}, year = {2023}, url = {https://eprint.iacr.org/2023/1505}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiteloudiBBFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BosRS22, author = {Joppe W. Bos and Joost Renes and Amber Sprenkels}, editor = {Lejla Batina and Joan Daemen}, title = {Dilithium for Memory Constrained Devices}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, pages = {217--235}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9\_10}, doi = {10.1007/978-3-031-17433-9\_10}, timestamp = {Sun, 10 Dec 2023 00:28:26 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/BosRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BosRV22, author = {Joppe W. Bos and Joost Renes and Christine van Vredendaal}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Sch{\"{o}}nhage-Strassen {\&} Nussbaumer}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3683--3697}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/bos}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/BosRV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosRS22, author = {Joppe W. Bos and Joost Renes and Amber Sprenkels}, title = {Dilithium for Memory Constrained Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2022}, url = {https://eprint.iacr.org/2022/323}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BosRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCRRSW22, author = {Joppe W. Bos and Brian Carlson and Joost Renes and Marius Rotaru and Amber Sprenkels and Geoffrey P. Waters}, title = {Post-Quantum Secure Boot on Vehicle Network Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2022}, url = {https://eprint.iacr.org/2022/635}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BosCRRSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MannWCB22, author = {Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann and Christian Weinert and Daphnee Chabal and Joppe W. Bos}, title = {Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1483}, year = {2022}, url = {https://eprint.iacr.org/2022/1483}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MannWCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BosHRV21, author = {Joppe W. Bos and Andreas H{\"{u}}lsing and Joost Renes and Christine van Vredendaal}, title = {Rapidly Verifiable {XMSS} Signatures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {137--168}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.137-168}, doi = {10.46586/TCHES.V2021.I1.137-168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BosHRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BosGRSV21, author = {Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal}, title = {Masking Kyber: First- and Higher-Order Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {173--214}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.173-214}, doi = {10.46586/TCHES.V2021.I4.173-214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BosGRSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BosORSV21, author = {Joppe W. Bos and Maximilian Ofner and Joost Renes and Tobias Schneider and Christine van Vredendaal}, editor = {Mauro Conti and Marc Stevens and Stephan Krenn}, title = {The Matrix Reloaded: Multiplication Strategies in FrodoKEM}, booktitle = {Cryptology and Network Security - 20th International Conference, {CANS} 2021, Vienna, Austria, December 13-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13099}, pages = {72--91}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92548-2\_5}, doi = {10.1007/978-3-030-92548-2\_5}, timestamp = {Tue, 14 Dec 2021 17:56:28 +0100}, biburl = {https://dblp.org/rec/conf/cans/BosORSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgteurope/Palacios-Garcia21, author = {Emilio J. Palacios{-}Garc{\'{\i}}a and Joppe W. Bos and Xavier Carpent and Geert Deconinck}, title = {A privacy-friendly aggregation algorithm for demand side management of residential loads}, booktitle = {{IEEE} {PES} Innovative Smart Grid Technologies Europe, {ISGT} Europe 2021, Espoo, Finland, October 18-21, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISGTEurope52324.2021.9640201}, doi = {10.1109/ISGTEUROPE52324.2021.9640201}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isgteurope/Palacios-Garcia21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosGRSV21, author = {Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal}, title = {Masking Kyber: First- and Higher-Order Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2021}, url = {https://eprint.iacr.org/2021/483}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosGRSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosORSV21, author = {Joppe W. Bos and Maximilian Ofner and Joost Renes and Tobias Schneider and Christine van Vredendaal}, title = {The Matrix Reloaded: Multiplication Strategies in FrodoKEM}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2021}, url = {https://eprint.iacr.org/2021/711}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosORSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosKP21, author = {Joppe W. Bos and Thorsten Kleinjung and Dan Page}, title = {Efficient Modular Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1151}, year = {2021}, url = {https://eprint.iacr.org/2021/1151}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BosF20, author = {Joppe W. Bos and Simon Friedberger}, title = {Faster modular arithmetic for isogeny-based crypto on embedded devices}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {97--109}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00214-6}, doi = {10.1007/S13389-019-00214-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BosF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosHRV20, author = {Joppe W. Bos and Andreas H{\"{u}}lsing and Joost Renes and Christine van Vredendaal}, title = {Rapidly Verifiable {XMSS} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {898}, year = {2020}, url = {https://eprint.iacr.org/2020/898}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosHRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosRV20, author = {Joppe W. Bos and Joost Renes and Christine van Vredendaal}, title = {Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Sch{\"{o}}nhage-Strassen {\&} Nussbaumer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1303}, year = {2020}, url = {https://eprint.iacr.org/2020/1303}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BosRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BockBBHMMGTT19, author = {Estuardo Alpirez Bock and Joppe W. Bos and Chris Brzuska and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen and Alexander Treff}, title = {White-Box Cryptography: Don't Forget About Grey-Box Attacks}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1095--1143}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09315-1}, doi = {10.1007/S00145-019-09315-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BockBBHMMGTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BosF19, author = {Joppe W. Bos and Simon Friedberger}, title = {Arithmetic Considerations for Isogeny-Based Cryptography}, journal = {{IEEE} Trans. Computers}, volume = {68}, number = {7}, pages = {979--990}, year = {2019}, url = {https://doi.org/10.1109/TC.2018.2851238}, doi = {10.1109/TC.2018.2851238}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/BosF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BockABBM19, author = {Estuardo Alpirez Bock and Alessandro Amadori and Joppe W. Bos and Chris Brzuska and Wil Michiels}, editor = {Mitsuru Matsui}, title = {Doubly Half-Injective PRGs for Incompressible White-Box Cryptography}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {189--209}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_10}, doi = {10.1007/978-3-030-12612-4\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BockABBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BockABBM19, author = {Estuardo Alpirez Bock and Alessandro Amadori and Joppe W. Bos and Chris Brzuska and Wil Michiels}, title = {Doubly half-injective PRGs for incompressible white-box cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2019}, url = {https://eprint.iacr.org/2019/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BockABBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AmbroseBFJLM18, author = {Christopher Ambrose and Joppe W. Bos and Bj{\"{o}}rn Fay and Marc Joye and Manfred Lochter and Bruce Murray}, editor = {Nigel P. Smart}, title = {Differential Attacks on Deterministic Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {339--353}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_18}, doi = {10.1007/978-3-319-76953-0\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AmbroseBFJLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BosDKLLSSSS18, author = {Joppe W. Bos and L{\'{e}}o Ducas and Eike Kiltz and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Gregor Seiler and Damien Stehl{\'{e}}}, title = {{CRYSTALS} - Kyber: {A} CCA-Secure Module-Lattice-Based {KEM}}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {353--367}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00032}, doi = {10.1109/EUROSP.2018.00032}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BosDKLLSSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BosFMOS18, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Assessing the Feasibility of Single Trace Power Analysis of Frodo}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {216--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_10}, doi = {10.1007/978-3-030-10970-7\_10}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BosFMOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosF18, author = {Joppe W. Bos and Simon Friedberger}, title = {Arithmetic Considerations for Isogeny Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2018}, url = {https://eprint.iacr.org/2018/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosFMOS18, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Assessing the Feasibility of Single Trace Power Analysis of Frodo}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2018}, url = {https://eprint.iacr.org/2018/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosFMOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosF18a, author = {Joppe W. Bos and Simon Friedberger}, title = {Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {792}, year = {2018}, url = {https://eprint.iacr.org/2018/792}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosF18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosFMOS18a, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Fly, you fool! Faster Frodo for the {ARM} Cortex-M4}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1116}, year = {2018}, url = {https://eprint.iacr.org/2018/1116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosFMOS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BosNP17, author = {Joppe W. Bos and Michael Naehrig and Joop van de Pol}, title = {Sieving for shortest vectors in ideal lattices: a practical perspective}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {313--329}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010312}, doi = {10.1504/IJACT.2017.10010312}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BosNP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BottinelliB17, author = {Paul Bottinelli and Joppe W. Bos}, title = {Computational aspects of correlation power analysis}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {167--181}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0122-9}, doi = {10.1007/S13389-016-0122-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BottinelliB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BosCIV17, author = {Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, editor = {Marc Joye and Abderrahmane Nitaj}, title = {Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {184--201}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57339-7\_11}, doi = {10.1007/978-3-319-57339-7\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BosCIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/BosF17, author = {Joppe W. Bos and Simon Friedberger}, editor = {Neil Burgess and Javier D. Bruguera and Florent de Dinechin}, title = {Fast Arithmetic Modulo 2\({}^{\mbox{x}}\) p\({}^{\mbox{y}}\) {\(\pm\)} 1}, booktitle = {24th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2017, London, United Kingdom, July 24-26, 2017}, pages = {148--155}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ARITH.2017.15}, doi = {10.1109/ARITH.2017.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/BosF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BonteBBCIV17, author = {Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, editor = {Wieland Fischer and Naofumi Homma}, title = {Faster Homomorphic Function Evaluation Using Non-integral Base Encoding}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {579--600}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_28}, doi = {10.1007/978-3-319-66787-4\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BonteBBCIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonteBBCIV17, author = {Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Faster Homomorphic Function Evaluation using Non-Integral Base Encoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2017}, url = {http://eprint.iacr.org/2017/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonteBBCIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosHMMGT17, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen}, title = {White-Box Cryptography: Don't Forget About Grey Box Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2017}, url = {http://eprint.iacr.org/2017/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosHMMGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosDKLLSSS17, author = {Joppe W. Bos and L{\'{e}}o Ducas and Eike Kiltz and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehl{\'{e}}}, title = {{CRYSTALS} - Kyber: a CCA-secure module-lattice-based {KEM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2017}, url = {http://eprint.iacr.org/2017/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosDKLLSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbroseBFJLM17, author = {Christopher Ambrose and Joppe W. Bos and Bj{\"{o}}rn Fay and Marc Joye and Manfred Lochter and Bruce Murray}, title = {Differential Attacks on Deterministic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2017}, url = {http://eprint.iacr.org/2017/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbroseBFJLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosM17, author = {Joppe W. Bos and Peter L. Montgomery}, title = {Montgomery Arithmetic from a Software Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2017}, url = {http://eprint.iacr.org/2017/1057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BosCLN16, author = {Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig}, title = {Selecting elliptic curves for cryptography: an efficiency and security analysis}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {4}, pages = {259--286}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0097-y}, doi = {10.1007/S13389-015-0097-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/BosCLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BosCHL16, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, title = {Fast Cryptography in Genus 2}, journal = {J. Cryptol.}, volume = {29}, number = {1}, pages = {28--60}, year = {2016}, url = {https://doi.org/10.1007/s00145-014-9188-7}, doi = {10.1007/S00145-014-9188-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BosCHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BosCDMNNRS16, author = {Joppe W. Bos and Craig Costello and L{\'{e}}o Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from {LWE}}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1006--1018}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978425}, doi = {10.1145/2976749.2978425}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BosCDMNNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosHMT16, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {215--236}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_11}, doi = {10.1007/978-3-662-53140-2\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/BosHMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/BosM16, author = {Joppe W. Bos and Wil Michiels}, title = {Security Assessment of Software Security: {A} Closer Look at White-Box Cryptographic Implementations}, journal = {{ERCIM} News}, volume = {2016}, number = {106}, year = {2016}, url = {http://ercim-news.ercim.eu/en106/special/security-assessment-of-software-security-a-closer-look-at-white-box-cryptographic-implementations}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/BosM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCDMNNRS16, author = {Joppe W. Bos and Craig Costello and L{\'{e}}o Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila}, title = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2016}, url = {http://eprint.iacr.org/2016/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCDMNNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosF16, author = {Joppe W. Bos and Simon Friedberger}, title = {Fast Arithmetic Modulo 2\({}^{\mbox{xp\({}^{\mbox{y{\(\pm\)}}}\)}}\) 1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2016}, url = {http://eprint.iacr.org/2016/986}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCIV16, author = {Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1117}, year = {2016}, url = {http://eprint.iacr.org/2016/1117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCIV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BosCNS15, author = {Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila}, title = {Post-Quantum Key Exchange for the {TLS} Protocol from the Ring Learning with Errors Problem}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {553--570}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.40}, doi = {10.1109/SP.2015.40}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BosCNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BottinelliB15, author = {Paul Bottinelli and Joppe W. Bos}, title = {Computational Aspects of Correlation Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2015}, url = {http://eprint.iacr.org/2015/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BottinelliB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosHMT15, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen}, title = {Differential Computation Analysis: Hiding your White-Box Designs is Not Enough}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2015}, url = {http://eprint.iacr.org/2015/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosHMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbi/BosLN14, author = {Joppe W. Bos and Kristin E. Lauter and Michael Naehrig}, title = {Private predictive analysis on encrypted medical data}, journal = {J. Biomed. Informatics}, volume = {50}, pages = {234--243}, year = {2014}, url = {https://doi.org/10.1016/j.jbi.2014.04.003}, doi = {10.1016/J.JBI.2014.04.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbi/BosLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Bos14, author = {Joppe W. Bos}, title = {Constant time modular inversion}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {275--281}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0084-8}, doi = {10.1007/S13389-014-0084-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Bos14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BosDJ14, author = {Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev}, title = {Collision bounds for the additive Pollard rho algorithm for solving discrete logarithms}, journal = {J. Math. Cryptol.}, volume = {8}, number = {1}, pages = {71--92}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0032}, doi = {10.1515/JMC-2012-0032}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BosDJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KleinjungBL14, author = {Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Mersenne Factorization Factory}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {358--377}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_19}, doi = {10.1007/978-3-662-45611-8\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KleinjungBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MieleBKL14, author = {Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra}, editor = {Lejla Batina and Matthew Robshaw}, title = {Cofactorization on Graphics Processing Units}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {335--352}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_19}, doi = {10.1007/978-3-662-44709-3\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MieleBKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BosHHMNW14, author = {Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Elliptic Curve Cryptography in Practice}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {157--175}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_11}, doi = {10.1007/978-3-662-45472-5\_11}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/BosHHMNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BosCM14, author = {Joppe W. Bos and Craig Costello and Andrea Miele}, editor = {Hugo Krawczyk}, title = {Elliptic and Hyperelliptic Curves: {A} Practical Security Analysis}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {203--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_12}, doi = {10.1007/978-3-642-54631-0\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BosCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCLN14, author = {Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig}, title = {Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2014}, url = {http://eprint.iacr.org/2014/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosLN14, author = {Joppe W. Bos and Kristin E. Lauter and Michael Naehrig}, title = {Private Predictive Analysis on Encrypted Medical Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2014}, url = {http://eprint.iacr.org/2014/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MieleBKL14, author = {Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra}, title = {Cofactorization on Graphics Processing Units}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2014}, url = {http://eprint.iacr.org/2014/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MieleBKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCNS14, author = {Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila}, title = {Post-quantum key exchange for the {TLS} protocol from the ring learning with errors problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2014}, url = {http://eprint.iacr.org/2014/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinjungBL14a, author = {Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra}, title = {Mersenne factorization factory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2014}, url = {http://eprint.iacr.org/2014/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinjungBL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosNP14, author = {Joppe W. Bos and Michael Naehrig and Joop van de Pol}, title = {Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2014}, url = {http://eprint.iacr.org/2014/880}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosCHL13, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {High-Performance Scalar Multiplication Using 8-Dimensional {GLV/GLS} Decomposition}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {331--348}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_19}, doi = {10.1007/978-3-642-40349-1\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BosCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BosCHL13, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Fast Cryptography in Genus 2}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {194--210}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_12}, doi = {10.1007/978-3-642-38348-9\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BosCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BosLLN13, author = {Joppe W. Bos and Kristin E. Lauter and Jake Loftus and Michael Naehrig}, editor = {Martijn Stam}, title = {Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {45--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_4}, doi = {10.1007/978-3-642-45239-0\_4}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/BosLLN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BosCN13, author = {Joppe W. Bos and Craig Costello and Michael Naehrig}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Exponentiating in Pairing Groups}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {438--455}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_22}, doi = {10.1007/978-3-662-43414-7\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BosCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BosMSZ13, author = {Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Montgomery Multiplication Using Vector Instructions}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {471--489}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_24}, doi = {10.1007/978-3-662-43414-7\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BosMSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosLLN13, author = {Joppe W. Bos and Kristin E. Lauter and Jake Loftus and Michael Naehrig}, title = {Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2013}, url = {http://eprint.iacr.org/2013/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosLLN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCHL13, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, title = {High-Performance Scalar Multiplication using 8-Dimensional {GLV/GLS} Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2013}, url = {http://eprint.iacr.org/2013/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCN13, author = {Joppe W. Bos and Craig Costello and Michael Naehrig}, title = {Exponentiating in Pairing Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2013}, url = {http://eprint.iacr.org/2013/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosMSZ13, author = {Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha}, title = {Montgomery Multiplication Using Vector Instructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2013}, url = {http://eprint.iacr.org/2013/519}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosMSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCM13, author = {Joppe W. Bos and Craig Costello and Andrea Miele}, title = {Elliptic and Hyperelliptic Curves: a Practical Security Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2013}, url = {http://eprint.iacr.org/2013/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosHHMNW13, author = {Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow}, title = {Elliptic Curve Cryptography in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2013}, url = {http://eprint.iacr.org/2013/734}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosHHMNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ch/Bos12, author = {Joppe W. Bos}, title = {On the Cryptanalysis of Public-Key Cryptography}, school = {EPFL, Switzerland}, year = {2012}, url = {https://doi.org/10.5075/epfl-thesis-5291}, doi = {10.5075/EPFL-THESIS-5291}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ch/Bos12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KleinjungBLOACFTJTLMTS12, author = {Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra and Dag Arne Osvik and Kazumaro Aoki and Scott Contini and Jens Franke and Emmanuel Thom{\'{e}} and Pascal Jermini and Michela Thi{\'{e}}mard and Paul C. Leyland and Peter L. Montgomery and Andrey Timofeev and Heinz Stockinger}, title = {A heterogeneous computing environment to solve the 768-bit {RSA} challenge}, journal = {Clust. Comput.}, volume = {15}, number = {1}, pages = {53--68}, year = {2012}, url = {https://doi.org/10.1007/s10586-010-0149-0}, doi = {10.1007/S10586-010-0149-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/KleinjungBLOACFTJTLMTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BosKKLM12, author = {Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {3}, pages = {212--228}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.045590}, doi = {10.1504/IJACT.2012.045590}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BosKKLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/Bos12, author = {Joppe W. Bos}, title = {Low-Latency Elliptic Curve Scalar Multiplication}, journal = {Int. J. Parallel Program.}, volume = {40}, number = {5}, pages = {532--550}, year = {2012}, url = {https://doi.org/10.1007/s10766-012-0198-5}, doi = {10.1007/S10766-012-0198-5}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/Bos12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BosK12, author = {Joppe W. Bos and Thorsten Kleinjung}, editor = {Xiaoyun Wang and Kazue Sako}, title = {{ECM} at Work}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {467--484}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_29}, doi = {10.1007/978-3-642-34961-4\_29}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BosK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LenstraHABKW12, author = {Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Public Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {626--642}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_37}, doi = {10.1007/978-3-642-32009-5\_37}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LenstraHABKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-4285, author = {Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery}, title = {Finding ECM-Friendly Curves through a Study of Galois Properties}, journal = {CoRR}, volume = {abs/1202.4285}, year = {2012}, url = {http://arxiv.org/abs/1202.4285}, eprinttype = {arXiv}, eprint = {1202.4285}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-4285.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LenstraHABKW12, author = {Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter}, title = {Ron was wrong, Whit is right}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2012}, url = {http://eprint.iacr.org/2012/064}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LenstraHABKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuBBKM12, author = {Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery}, title = {Finding ECM-Friendly Curves through a Study of Galois Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2012}, url = {http://eprint.iacr.org/2012/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuBBKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosDJ12, author = {Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev}, title = {Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2012}, url = {http://eprint.iacr.org/2012/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosDJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosK12, author = {Joppe W. Bos and Thorsten Kleinjung}, title = {{ECM} at Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2012}, url = {http://eprint.iacr.org/2012/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCHL12, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, title = {Two is Greater than One}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2012}, url = {http://eprint.iacr.org/2012/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/BosKLM10, author = {Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, editor = {Elisardo Antelo and David Hough and Paolo Ienne}, title = {Efficient {SIMD} Arithmetic Modulo a Mersenne Number}, booktitle = {20th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2011, T{\"{u}}bingen, Germany, 25-27 July 2011}, pages = {213--221}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARITH.2011.37}, doi = {10.1109/ARITH.2011.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/BosKLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosOS11, author = {Joppe W. Bos and Onur {\"{O}}zen and Martijn Stam}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Efficient Hashing Using the {AES} Instruction Set}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {507--522}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_33}, doi = {10.1007/978-3-642-23951-9\_33}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/BosOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BosKNS10, author = {Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {{ECC2K-130} on Cell CPUs}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {225--242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_14}, doi = {10.1007/978-3-642-12678-9\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BosKNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/BosKL10, author = {Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra}, editor = {Guillaume Hanrot and Fran{\c{c}}ois Morain and Emmanuel Thom{\'{e}}}, title = {On the Use of the Negation Map in the Pollard Rho Method}, booktitle = {Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6197}, pages = {66--82}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14518-6\_9}, doi = {10.1007/978-3-642-14518-6\_9}, timestamp = {Thu, 14 Oct 2021 10:35:26 +0200}, biburl = {https://dblp.org/rec/conf/ants/BosKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosS10, author = {Joppe W. Bos and Deian Stefan}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Performance Analysis of the {SHA-3} Candidates on Exotic Multi-core Architectures}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {279--293}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_19}, doi = {10.1007/978-3-642-15031-9\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/BosS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KleinjungAFLTBGKMORTZ10, author = {Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen K. Lenstra and Emmanuel Thom{\'{e}} and Joppe W. Bos and Pierrick Gaudry and Alexander Kruppa and Peter L. Montgomery and Dag Arne Osvik and Herman J. J. te Riele and Andrey Timofeev and Paul Zimmermann}, editor = {Tal Rabin}, title = {Factorization of a 768-Bit {RSA} Modulus}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {333--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_18}, doi = {10.1007/978-3-642-14623-7\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KleinjungAFLTBGKMORTZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OsvikBSC10, author = {Dag Arne Osvik and Joppe W. Bos and Deian Stefan and David Canright}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Fast Software {AES} Encryption}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {75--93}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_5}, doi = {10.1007/978-3-642-13858-4\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/OsvikBSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/Bos10, author = {Joppe W. Bos}, editor = {M. Anwar Hasan and Tor Helleseth}, title = {High-Performance Modular Multiplication on the Cell Processor}, booktitle = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI} 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6087}, pages = {7--24}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13797-6\_2}, doi = {10.1007/978-3-642-13797-6\_2}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/Bos10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinjungAFLTBGKMORTZ10, author = {Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen K. Lenstra and Emmanuel Thom{\'{e}} and Joppe W. Bos and Pierrick Gaudry and Alexander Kruppa and Peter L. Montgomery and Dag Arne Osvik and Herman J. J. te Riele and Andrey Timofeev and Paul Zimmermann}, title = {Factorization of a 768-bit {RSA} modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2010}, url = {http://eprint.iacr.org/2010/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinjungAFLTBGKMORTZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosKNS10, author = {Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe}, title = {{ECC2K-130} on Cell CPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2010}, url = {http://eprint.iacr.org/2010/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosKNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosKLM10, author = {Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {Efficient {SIMD} arithmetic modulo a Mersenne number}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2010}, url = {http://eprint.iacr.org/2010/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosKLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosOS10, author = {Joppe W. Bos and Onur {\"{O}}zen and Martijn Stam}, title = {Efficient Hashing using the {AES} Instruction Set}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2010}, url = {http://eprint.iacr.org/2010/576}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BosOH09, author = {Joppe W. Bos and Onur {\"{O}}zen and Jean{-}Pierre Hubaux}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Analysis and Optimization of Cryptographically Generated Addresses}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {17--32}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_2}, doi = {10.1007/978-3-642-04474-8\_2}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/BosOH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppam/BosK09, author = {Joppe W. Bos and Marcelo E. Kaihara}, editor = {Roman Wyrzykowski and Jack J. Dongarra and Konrad Karczewski and Jerzy Wasniewski}, title = {Montgomery Multiplication on the Cell}, booktitle = {Parallel Processing and Applied Mathematics, 8th International Conference, {PPAM} 2009, Wroclaw, Poland, September 13-16, 2009. Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6067}, pages = {477--485}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14390-8\_50}, doi = {10.1007/978-3-642-14390-8\_50}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/ppam/BosK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosKKLM09, author = {Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {On the Security of 1024-bit {RSA} and 160-bit Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2009}, url = {http://eprint.iacr.org/2009/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosKKLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09, author = {Daniel V. Bailey and Brian Baldwin and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Gauthier Van Damme and Giacomo de Meulenaer and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel}, title = {The Certicom Challenges {ECC2-X}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2009}, url = {http://eprint.iacr.org/2009/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosOS09, author = {Joppe W. Bos and Dag Arne Osvik and Deian Stefan}, title = {Fast Implementations of {AES} on Various Platforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2009}, url = {http://eprint.iacr.org/2009/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09, author = {Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Gauthier Van Damme and Giacomo de Meulenaer and Luis J. Dominguez Perez and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo{-}Yin Yang}, title = {Breaking {ECC2K-130}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2009}, url = {http://eprint.iacr.org/2009/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.