关注
James Howe
James Howe
Staff Research Scientist, SandboxAQ
在 sandboxaq.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
On practical discrete Gaussian samplers for lattice-based cryptography
J Howe, A Khalid, C Rafferty, F Regazzoni, M O’Neill
IEEE Transactions on Computers 67 (3), 322-334, 2016
962016
Standard Lattice-Based Key Encapsulation on Embedded Devices
J Howe, T Oder, M Krausz, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 372-393, 2018
792018
Practical Lattice-based Digital Signature Schemes
J Howe, T Poeppelmann, M O’Neill, E O’Sullivan, T Gueneysu
ACM Transactions on Embedded Computing Systems 14, 24, 2015
722015
Lattice-based encryption over standard lattices in hardware
J Howe, C Moore, M O'Neill, F Regazzoni, T Güneysu, K Beeden
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
592016
Side-channel Assisted Existential Forgery Attack on Dilithium-A NIST PQC candidate
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
522018
Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
462019
Isochronous Gaussian Sampling: From Inception to Implementation: With Applications to the Falcon Signature Scheme
J Howe, T Prest, T Ricosset, M Rossi
Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020
432020
The Return of the SDitH
C Aguilar-Melchor, N Gama, J Howe, A Hülsing, D Joseph, D Yue
Annual International Conference on the Theory and Applications of …, 2023
402023
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
S McCarthy, J Howe, N Smyth, S Brannigan, M O’Neill
16th International Joint Conference on e-Business and Telecommunications …, 2019
322019
SoK: How (not) to Design and Implement Post-Quantum Cryptography
J Howe, T Prest, D Apon
Cryptographers' Track at the RSA Conference, 2021
262021
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
J Howe, A Khalid, M Martinoli, F Regazzoni, E Oswald
2019 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2019
252019
Compact, scalable, and efficient discrete Gaussian samplers for lattice-based cryptography
A Khalid, J Howe, C Rafferty, F Regazzoni, M O'Neill
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
222018
Time-independent discrete Gaussian sampling for post-quantum cryptography
A Khalid, J Howe, C Rafferty, M O'Neill
2016 International Conference on Field-Programmable Technology (FPT), 241-244, 2016
212016
Lightweight hardware implementation of R-LWE lattice-based cryptography
S Fan, W Liu, J Howe, A Khalid, M O’Neill
2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 403-406, 2018
202018
Lattice-based Key-sharing Schemes: A Survey
P Ravi, J Howe, A Chattopadhyay, S Bhasin
ACM Computing Surveys (CSUR) 54 (1), 1-39, 2021
172021
Optimised lattice-based key encapsulation in hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
NIST’s Second PQC Standardization Conference 2019, 13, 2019
172019
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
Journal of Cryptographic Engineering 11 (4), 317-327, 2021
162021
Benchmarking and Analysing NIST PQC Lattice-Based Signature Scheme Standards on the ARM Cortex M7
J Howe, B Westerbaan
International Conference on Cryptology in Africa, 2023
14*2023
Attacks on NIST PQC 3rd Round Candidates
D Apon, J Howe
IACR Real World Crypto Symposium 10, 2021
11*2021
Compact and provably secure lattice-based signatures in hardware
J Howe, C Rafferty, A Khalid, M O'Neill
2017 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2017
82017
系统目前无法执行此操作,请稍后再试。
文章 1–20