Seguir
James Howe
James Howe
Staff Research Scientist, SandboxAQ
Email confirmado em sandboxaq.com - Página inicial
Título
Citado por
Citado por
Ano
On practical discrete Gaussian samplers for lattice-based cryptography
J Howe, A Khalid, C Rafferty, F Regazzoni, M O’Neill
IEEE Transactions on Computers 67 (3), 322-334, 2016
1032016
Standard Lattice-Based Key Encapsulation on Embedded Devices
J Howe, T Oder, M Krausz, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 372-393, 2018
872018
Practical Lattice-based Digital Signature Schemes
J Howe, T Poeppelmann, M O’Neill, E O’Sullivan, T Gueneysu
ACM Transactions on Embedded Computing Systems 14, 24, 2015
792015
Side-channel Assisted Existential Forgery Attack on Dilithium-A NIST PQC candidate
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
612018
Lattice-based encryption over standard lattices in hardware
J Howe, C Moore, M O'Neill, F Regazzoni, T Güneysu, K Beeden
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
612016
The Return of the SDitH
C Aguilar-Melchor, N Gama, J Howe, A Hülsing, D Joseph, D Yue
Annual International Conference on the Theory and Applications of …, 2023
552023
Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
512019
Isochronous Gaussian Sampling: From Inception to Implementation: With Applications to the Falcon Signature Scheme
J Howe, T Prest, T Ricosset, M Rossi
Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020
442020
Toward a queer digital humanities
B Ruberg, J Boyd, J Howe
Bodies of information: Intersectional feminism and the digital humanities …, 2018
402018
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
S McCarthy, J Howe, N Smyth, S Brannigan, M O’Neill
16th International Joint Conference on e-Business and Telecommunications …, 2019
322019
SoK: How (not) to Design and Implement Post-Quantum Cryptography
J Howe, T Prest, D Apon
Cryptographers' Track at the RSA Conference, 2021
292021
Lattice-based Key-sharing Schemes: A Survey
P Ravi, J Howe, A Chattopadhyay, S Bhasin
ACM Computing Surveys (CSUR) 54 (1), 1-39, 2021
282021
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
J Howe, A Khalid, M Martinoli, F Regazzoni, E Oswald
2019 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2019
262019
Compact, scalable, and efficient discrete Gaussian samplers for lattice-based cryptography
A Khalid, J Howe, C Rafferty, F Regazzoni, M O'Neill
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
222018
Lightweight hardware implementation of R-LWE lattice-based cryptography
S Fan, W Liu, J Howe, A Khalid, M O’Neill
2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 403-406, 2018
212018
Time-independent discrete Gaussian sampling for post-quantum cryptography
A Khalid, J Howe, C Rafferty, M O'Neill
2016 International Conference on Field-Programmable Technology (FPT), 241-244, 2016
202016
Optimised lattice-based key encapsulation in hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
NIST’s Second PQC Standardization Conference 2019, 13, 2019
172019
Benchmarking and Analysing NIST PQC Lattice-Based Signature Scheme Standards on the ARM Cortex M7
J Howe, B Westerbaan
International Conference on Cryptology in Africa, 2023
16*2023
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
Journal of Cryptographic Engineering 11 (4), 317-327, 2021
152021
Attacks on NIST PQC 3rd Round Candidates
D Apon, J Howe
IACR Real World Crypto Symposium 10, 2021
15*2021
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20