Joppe W. Bos
Joppe W. Bos
Cryptographic Researcher, NXP Semiconductors, Leuven, Belgium
Verified email at - Homepage
Cited by
Cited by
Factorization of a 768-bit RSA modulus
T Kleinjung, K Aoki, J Franke, AK Lenstra, E Thomé, JW Bos, P Gaudry, ...
Annual Cryptology Conference, 333-350, 2010
Improved security for a ring-based fully homomorphic encryption scheme
JW Bos, K Lauter, J Loftus, M Naehrig
IMA International Conference on Cryptography and Coding, 45-64, 2013
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
JW Bos, C Costello, M Naehrig, D Stebila
2015 IEEE Symposium on Security and Privacy, 553-570, 2015
Public keys
AK Lenstra, JP Hughes, M Augier, JW Bos, T Kleinjung, C Wachter
Annual Cryptology Conference, 626-642, 2012
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Elliptic Curve Cryptography in Practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
Financial Cryptography and Data Security, 2013
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 353-367, 2018
Private Predictive Analysis on Encrypted Medical Data
JW Bos, K Lauter, M Naehrig
Journal of Biomedical Informatics, 2014
Fast software AES encryption
DA Osvik, JW Bos, D Stefan, D Canright
International Workshop on Fast Software Encryption, 75-93, 2010
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
JW Bos, C Costello, P Longa, M Naehrig
Differential computation analysis: Hiding your white-box designs is not enough
JW Bos, C Hubain, W Michiels, P Teuwen
International Conference on Cryptographic Hardware and Embedded Systems, 215-236, 2016
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
J Bos, M Kaihara, T Kleinjung, AK Lenstra, PL Montgomery
Fast cryptography in genus 2
JW Bos, C Costello, H Hisil, K Lauter
Annual International Conference on the Theory and Applications of …, 2013
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction
JW Bos, ME Kaihara, T Kleinjung, AK Lenstra, PL Montgomery
International Journal of Applied Cryptography 2 (3), 212-228, 2012
Breaking ECC2K-130.
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptol. ePrint Arch. 2009, 541, 2009
Initial recommendations of long-term secure post-quantum systems
D Augot, L Batina, DJ Bernstein, J Bos, J Buchmann, W Castryck, ...
Available at pqcrypto. eu. org/docs/initial-recommendations. pdf, 2015
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition.
JW Bos, C Costello, H Hisil, K Lauter
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2013 2013 …, 2013
Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling
JW Bos, W Castryck, I Iliashenko, F Vercauteren
International Conference on Cryptology in Africa, 184-201, 2017
Sieving for shortest vectors in ideal lattices: a practical perspective
JW Bos, M Naehrig, JVD Pol
International Journal of Applied Cryptography 3 (4), 313-329, 2017
Analysis and optimization of cryptographically generated addresses
JW Bos, O Özen, JP Hubaux
International Conference on Information Security, 17-32, 2009
The system can't perform the operation now. Try again later.
Articles 1–20