CINXE.COM

Publications - Homepage

<!doctype html> <html lang="en" class="no-js"> <head> <meta charset="utf-8"> <!-- begin SEO --> <title>Publications - Homepage</title> <meta property="og:locale" content="en-US"> <meta property="og:site_name" content="Homepage"> <meta property="og:title" content="Publications"> <link rel="canonical" href="https://www.joppebos.com/publications/"> <meta property="og:url" content="https://www.joppebos.com/publications/"> <script type="application/ld+json"> { "@context" : "https://schema.org", "@type" : "Person", "name" : "Joppe W. Bos", "url" : "https://www.joppebos.com/", "sameAs" : null } </script> <!-- end SEO --> <link href="https://www.joppebos.com//feed.xml" type="application/atom+xml" rel="alternate" title="Homepage Feed"> <!-- https://t.co/dKP3o1e --> <meta name="HandheldFriendly" content="True"> <meta name="MobileOptimized" content="320"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script> document.documentElement.className = document.documentElement.className.replace(/\bno-js\b/g, '') + ' js '; </script> <!-- For all browsers --> <link rel="stylesheet" href="https://www.joppebos.com//assets/css/main.css"> <meta http-equiv="cleartype" content="on"> <!-- start custom head snippets --> <link rel="apple-touch-icon" sizes="57x57" href="https://www.joppebos.com//images/apple-touch-icon-57x57.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="60x60" href="https://www.joppebos.com//images/apple-touch-icon-60x60.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="72x72" href="https://www.joppebos.com//images/apple-touch-icon-72x72.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="76x76" href="https://www.joppebos.com//images/apple-touch-icon-76x76.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="114x114" href="https://www.joppebos.com//images/apple-touch-icon-114x114.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="120x120" href="https://www.joppebos.com//images/apple-touch-icon-120x120.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="144x144" href="https://www.joppebos.com//images/apple-touch-icon-144x144.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="152x152" href="https://www.joppebos.com//images/apple-touch-icon-152x152.png?v=M44lzPylqQ"> <link rel="apple-touch-icon" sizes="180x180" href="https://www.joppebos.com//images/apple-touch-icon-180x180.png?v=M44lzPylqQ"> <link rel="icon" type="image/png" href="https://www.joppebos.com//images/favicon-32x32.png?v=M44lzPylqQ" sizes="32x32"> <link rel="icon" type="image/png" href="https://www.joppebos.com//images/android-chrome-192x192.png?v=M44lzPylqQ" sizes="192x192"> <link rel="icon" type="image/png" href="https://www.joppebos.com//images/favicon-96x96.png?v=M44lzPylqQ" sizes="96x96"> <link rel="icon" type="image/png" href="https://www.joppebos.com//images/favicon-16x16.png?v=M44lzPylqQ" sizes="16x16"> <link rel="manifest" href="https://www.joppebos.com//images/manifest.json?v=M44lzPylqQ"> <link rel="mask-icon" href="https://www.joppebos.com//images/safari-pinned-tab.svg?v=M44lzPylqQ" color="#000000"> <link rel="shortcut icon" href="/images/favicon.ico?v=M44lzPylqQ"> <meta name="msapplication-TileColor" content="#000000"> <meta name="msapplication-TileImage" content="https://www.joppebos.com//images/mstile-144x144.png?v=M44lzPylqQ"> <meta name="msapplication-config" content="https://www.joppebos.com//images/browserconfig.xml?v=M44lzPylqQ"> <meta name="theme-color" content="#ffffff"> <link rel="stylesheet" href="https://www.joppebos.com//assets/css/academicons.css"/> <script type="text/x-mathjax-config"> MathJax.Hub.Config({ TeX: { equationNumbers: { autoNumber: "all" } } }); </script> <script type="text/x-mathjax-config"> MathJax.Hub.Config({ tex2jax: { inlineMath: [ ['$','$'], ["\\(","\\)"] ], processEscapes: true } }); </script> <script src='https://cdnjs.cloudflare.com/ajax/libs/mathjax/2.7.4/latest.js?config=TeX-MML-AM_CHTML' async></script> <!-- end custom head snippets --> </head> <body> <!--[if lt IE 9]> <div class="notice--danger align-center" style="margin: 0;">You are using an <strong>outdated</strong> browser. Please <a href="https://browsehappy.com/">upgrade your browser</a> to improve your experience.</div> <![endif]--> <div class="masthead"> <div class="masthead__inner-wrap"> <div class="masthead__menu"> <nav id="site-nav" class="greedy-nav"> <button><div class="navicon"></div></button> <ul class="visible-links"> <li class="masthead__menu-item masthead__menu-item--lg"><a href="https://www.joppebos.com/">Homepage</a></li> <li class="masthead__menu-item"><a href="https://www.joppebos.com/publications/">Publications</a></li> <li class="masthead__menu-item"><a href="https://www.joppebos.com/presentations/">Presentations</a></li> <li class="masthead__menu-item"><a href="https://www.joppebos.com/interests/">Interests</a></li> <li class="masthead__menu-item"><a href="https://www.joppebos.com/montgomery/">Montgomery Book</a></li> <li class="masthead__menu-item"><a href="https://www.joppebos.com/lenstra/">Lenstra Book</a></li> </ul> <ul class="hidden-links hidden"></ul> </nav> </div> </div> </div> <div id="main" role="main"> <div class="sidebar sticky"> <div itemscope itemtype="https://schema.org/Person"> <div class="author__avatar"> <img src="https://www.joppebos.com//images/profile.png" class="author__avatar" alt="Joppe W. Bos"> </div> <div class="author__content"> <h3 class="author__name">Joppe W. Bos</h3> <p class="author__bio">Cryptographic Researcher at NXP Semiconductors</p> <p class="author__bio">Secretary of the IACR (2017-2019, 2020-2022)</p> <p class="author__bio">Editor of the Cryptology ePrint Archive (2019-today)</p> </div> <div class="author__urls-wrapper"> <button class="btn btn--inverse">Follow</button> <ul class="author__urls social-icons"> <li><i class="fa fa-fw fa-map-marker" aria-hidden="true"></i> Leuven, Belgium</li> <li><a href="mailto:joppe.bos@nxp.com"><i class="fas fa-envelope" aria-hidden="true"></i> Email</a></li> <li><a href="https://www.facebook.com/jwbos"><i class="fab fa-facebook-square" aria-hidden="true"></i> Facebook</a></li> <li><a href="https://www.linkedin.com/in/joppebos"><i class="fab fa-linkedin" aria-hidden="true"></i> LinkedIn</a></li> <li><a href="https://github.com/jwbos"><i class="fab fa-github" aria-hidden="true"></i> Github</a></li> <li><a href="https://scholar.google.com/citations?user=OhI0sU4AAAAJ"><i class="fas fa-graduation-cap"></i> Google Scholar</a></li> </ul> </div> </div> </div> <div class="archive"> <h1 class="page__title">Publications</h1> <h2 id="summary">Summary</h2> <details> <summary><tt>Journal proceedings &nbsp;&nbsp; 18</tt></summary> <tt>Computing Surveys &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Cluster Computing &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>IEEE Transactions on Computers &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>International Journal of Applied Cryptography &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>International Journal of Parallel Programming &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Journal of Biomedical Informatics &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Journal of Cryptographic Engineering &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4</tt><br /> <tt>Journal of Cryptology &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2</tt><br /> <tt>Journal of Mathematical Cryptology &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Transactions on Cryptographic Hardware and Embedded Systems &nbsp; 3</tt><br /> <tt>TUGBoat: The Communications of the TeX Users Group &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Notices of the American Mathematical Society &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> </details> <details> <summary><tt>Conference proceedings 40</tt></summary> <tt>IACR Venues</tt><br /> <tt>Asiacrypt &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2</tt><br /> <tt>Crypto &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2</tt><br /> <tt>Eurocrypt &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Cryptographic Hardware and Embedded Systems (CHES) &nbsp; 6</tt><br /> <tt>Fast Software Encryption (FSE) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Public-Key Cryptography (PKC) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <br /> <tt>Other Venues</tt><br /> <tt>Algorithmic Number Theory Symposium (ANTS) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2</tt><br /> <tt>Africacrypt &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3</tt><br /> <tt>Computer and Communications Security (ACM CCS) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Cryptography and Coding &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Cryptology and Network Security (CANS) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Embedded Security in Cards (escar) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Financial Cryptography and Data Security &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>IEEE European Symposium on Security and Privacy (S&amp;P) &nbsp; 1</tt><br /> <tt>IEEE PES Innovative Smart Grid Technologies Europe &nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>IEEE Sustainable Power and Energy Conference (iSPEC) &nbsp;&nbsp; 1</tt><br /> <tt>IEEE Symposium on Computer Arithmetic (ARITH) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2</tt><br /> <tt>IEEE Symposium on Security and Privacy (S&amp;P) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Information Security Conference (ISC) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Parallel Processing and Applied Mathematics (PPAM) &nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>RSA Conference Cryptographers' Track (CT-RSA) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2</tt><br /> <tt>Scientific and Parallel Computing (PARA) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Selected Areas in Cryptography (SAC) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3</tt><br /> <tt>Smart Card Research & Advanced Application Conference &nbsp; 1</tt><br /> <tt>USENIX Security Symposium &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</tt><br /> <tt>Workshop on the Arithmetic of Finite Fields (WAIFI) &nbsp;&nbsp;&nbsp; 1</tt><br /> </details> <details> <summary><tt>Technical reports &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 6</tt></summary> <tt>IACR Cryptology ePrint Archive &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4</tt><br /> <tt>Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS) &nbsp; 2</tt> </details> <h2 id="2023">2023</h2> <ul> <li>Zoltan Adam Mann, Christian Weinert, Daphnee Chabal and Joppe W. Bos: <a href="https://eprint.iacr.org/2022/1483">Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead</a>. ACM Computing Surveys, Vol. 56, Issue 5, Article No.: 117, pp. 1–37, ACM, 2023.<br /> [ <a href="https://eprint.iacr.org/2022/1483.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/MWCB23.bib">bibtex</a> ]</li> </ul> <ul> <li>Konstantina Miteloudi, Joppe W. Bos, Olivier Bronchain, Björn Fay, and Joost Renes: <a href="https://eprint.iacr.org/2023/1505"><em>PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber</em></a>. Smart Card Research & Advanced Application Conference (CARDIS) (to appear), 2023.<br /> [ <a href="https://eprint.iacr.org/2023/1505.pdf">pdf</a> ] [ bibtex ]</li> </ul> <ul> <li>Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel and Christine van Vredendaal: <a href="https://doi.org/10.46586/tches.v2023.i3.74-96"><em>Enabling FrodoKEM on Embedded Devices</em></a>. Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2023, Issue 3, pp. 74-96, IACR, 2023.<br /> [ <a href="https://eprint.iacr.org/2023/158.pdf">pdf</a> ] [ bibtex ]</li> </ul> <ul> <li>Joppe W. Bos, Alexander Dima, Alexander Kiening and Joost Renes: <a href="https://eprint.iacr.org/2023/965">Post-Quantum Secure Over-the-Air Update of Automotive Systems</a>. Cryptology ePrint Archive, Report 2023/965, IACR, 2023. <br /> [ <a href="https://eprint.iacr.org/2023/965.pdf">pdf</a> ] [ bibtex ]</li> </ul> <ul> <li>Joppe W. Bos and Kevin McCurley: <em><a href="https://doi.org/10.47397/tb/44-1/tb136bos-metadata">Metadata in Journal Publishing</a></em>. TUGboat, <a href="https://tug.org/TUGboat/">The Communications of the TeX Users Group</a>, Issue 44:1, 2023.<br /> [ <a href="https://arxiv.org/pdf/2301.08277">pdf</a> ] [ bibtex ]</li> </ul> <h2 id="2022">2022</h2> <ul> <li>Joppe W. Bos, Michiel De Vis, Charles Faes, Nicolas Gonzalez-Deleito, Anna Hristoskova, Sarah Klein, and Sreeraj Rajendran: <a href="https://ieeexplore.ieee.org/abstract/document/10033036">Unsupervised, Federated and Privacy-Preserving Detection of Anomalous Electricity Consumption in Real-World Scenarios</a>. <a href="https://attend.ieee.org/ispec-2022/">IEEE Sustainable Power and Energy Conference</a> (iSPEC), IEEE, 2022. <br /> [ <a href="https://www.joppebos.com/files/Bos_iSPEC22.pdf">pdf</a> ] [ bibtex ]</li> </ul> <ul> <li>Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Daan Sprenkels and Geoffrey P. Waters: <em><a href="https://www.escar.info/escar-europe/program.html?lectureId=eudMV8P7b2FcYsv83WCS">Post-Quantum Secure Boot on Vehicle Network Processors</a></em>. <a href="https://www.escar.info/">Embedded Security in Cars</a> (escar), 2022<br /> [ <a href="https://eprint.iacr.org/2022/635.pdf">pdf</a> ] [ <a href="https://eprint.iacr.org/eprint-bin/cite.pl?entry=2022/635">bibtex</a> ]</li> </ul> <ul> <li>Joppe W. Bos, Joost Renes and Daan Sprenkels: <em>Dilithium for Memory Constrained Devices</em>. <a href="https://africacrypt2022.cs.ru.nl/">Africacrypt</a>, Lecture Notes in Computer Science, vol. 13503, pp. 217-235, Springer, 2022.<br /> [ <a href="https://eprint.iacr.org/2022/323.pdf">pdf</a> ] [ <a href="https://eprint.iacr.org/eprint-bin/cite.pl?entry=2022/323">bibtex</a> ]</li> </ul> <ul> <li>Joppe W. Bos, Joost Renes and Christine van Vredendaal: <a href="https://www.usenix.org/system/files/sec22summer_bos.pdf"><em>Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer</em></a>. <a href="https://www.usenix.org/conference/usenixsecurity22">USENIX Security Symposium</a> 2022.<br /> [ <a href="https://eprint.iacr.org/2020/1303.pdf">pdf</a> ] [ <a href="https://eprint.iacr.org/eprint-bin/cite.pl?entry=2020/1303">bibtex</a> ]</li> </ul> <h2 id="2021">2021</h2> <ul> <li>Emilio J. Palacios-Garcia, Joppe W. Bos, Xavier Carpent, and Geert Deconinck: A privacy-friendly aggregation algorithm for demand side management of residential loads. IEEE PES Innovative Smart Grid Technologies Europe, IEEE, 2021<br /> [ <a href="https://www.joppebos.com/files/privacy-friendly-aggregation.pdf">pdf</a> ] [ bibtex ]</li> <li>Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider and Christine van Vredendaal: <a href="https://link.springer.com/chapter/10.1007/978-3-030-92548-2_5"><em>The Matrix Reloaded: Multiplication Strategies in FrodoKEM</em></a>. Cryptology and Network Security (CANS), Lecture Notes in Computer Science, Vol. 13099, pp. 72-91, Springer, 2021.<br /> [ <a href="https://eprint.iacr.org/2021/711.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BORSvV_CANS21.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider and Christine van Vredendaal: <a href="https://doi.org/10.46586/tches.v2021.i4.173-214"><em>Masking Kyber: First- and Higher-Order Implementations</em></a>. Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2021, Issue 4, pp. 173-214, IACR, 2021.<br /> [ <a href="https://eprint.iacr.org/2021/483.pdf">pdf</a> ] [ <a href="https://eprint.iacr.org/eprint-bin/cite.pl?entry=2021/483">bibtex</a> ]</li> <li>Joppe W. Bos and Kristin E. Lauter: <a href="https://www.ams.org/notices"><em>In Memoriam: Peter L. Montgomery (1947–2020)</em></a>. Notices of the American Mathematical Society, Volume 68, Number 4, AMS, 2021.<br /> [ <a href="https://www.ams.org/notices/202104/rnoti-p538.pdf">pdf</a> ] </li> <li>Joppe W. Bos, Andreas Hülsing, Joost Renes and Christine van Vredendaal: <a href="https://doi.org/10.46586/tches.v2021.i1.137-168"><em>Rapidly Verifiable XMSS Signatures</em></a>. Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2021, Issue 1, pp. 137-168, IACR, 2021.<br /> [ <a href="https://eprint.iacr.org/2020/898.pdf">pdf</a> ] [ <a href="https://eprint.iacr.org/eprint-bin/cite.pl?entry=2020/898">bibtex</a> ]</li> </ul> <h2 id="2020">2020</h2> <ul> <li>Joppe W. Bos and Simon J. Friedberger: <a href="https://link.springer.com/article/10.1007/s13389-019-00214-6"><em>Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices</em></a>. Journal of Cryptographic Engineering, Springer, Volume 10, pp. 97-109, 2020.<br /> [ <a href="https://eprint.iacr.org/2018/792.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BF_JCEN20.bib">bibtex</a> ] [ <a href="https://www.joppebos.com/src/sidh.tgz">source code</a> ]</li> </ul> <h2 id="2019">2019</h2> <ul> <li>Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska and Wil Michiels: <a href="https://link.springer.com/chapter/10.1007/978-3-030-12612-4_10"><em>Doubly half-injective PRGs for incompressible white-box cryptography</em></a>. RSA Conference Cryptographers’ Track - CT-RSA, Lecture Notes in Computer Science, pp. 189–209, Springer, 2019.<br /> [ <a href="https://eprint.iacr.org/2019/329.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/AABBM_RSA19.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez and Philippe Teuwen, <a href="https://link.springer.com/article/10.1007/s00145-019-09315-1"><em>White-Box Cryptography: Don’t Forget About Grey Box Attacks</em></a>. Journal of Cryptology, Springer, Volume 32, pp. 1095-1143, 2019.<br /> [ <a href="https://eprint.iacr.org/2017/355.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BHMMGT_JoC19.bib">bibtex</a> ]</li> <li>Joppe W. Bos and Simon Friedberger: <a href="https://ieeexplore.ieee.org/abstract/document/8400486"><em>Arithmetic Considerations for Isogeny Based Cryptography</em></a>. IEEE Transactions on Computers, Vol. 68(7), pp. 979-990, IEEE, 2019.<br /> [ <a href="https://eprint.iacr.org/2018/376.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BF_ToC19.bib">bibtex</a> ]</li> </ul> <h2 id="2018">2018</h2> <ul> <li>Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald and Martijn Stam: <a href="https://eprint.iacr.org/2018/1116"><em>Fly, you fool! Faster Frodo for the ARM Cortex-M4</em></a>. Cryptology ePrint Archive, Report 2018/792, IACR, 2018.<br /> [ <a href="https://eprint.iacr.org/2018/1116.pdf">pdf</a> ] [ <a href="https://eprint.iacr.org/eprint-bin/cite.pl?entry=2018/1116">bibtex</a> ]</li> <li>Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam: <a href="https://link.springer.com/chapter/10.1007/978-3-030-10970-7_10"><em>Assessing the Feasibility of Single Trace Power Analysis of Frodo</em></a>. Selected Areas in Cryptography - SAC 2018, Lecture Notes in Computer Science 11349, pp. 216-234, Springer, 2018.<br /> [ <a href="https://eprint.iacr.org/2018/687">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BFMOS_SAC19.bib">bibtex</a> ]</li> <li>Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter and Bruce Murray: <a href="https://link.springer.com/chapter/10.1007/978-3-319-76953-0_18"><em>Differential Attacks on Deterministic Signatures</em></a>. RSA Conference Cryptographers’ Track - CT-RSA, Lecture Notes in Computer Science 10808, pp. 339–353, Springer, 2018.<br /> [ <a href="https://eprint.iacr.org/2017/975.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/ABFJLM_RSA18.bib">bibtex</a> ]</li> <li>Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe and Damien Stehlé: <a href="https://ieeexplore.ieee.org/abstract/document/8406610/"><em>CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM</em></a>. IEEE European Symposium on Security and Privacy - Euro S&amp;P, pp. 353-367, IEEE, 2018 [ <a href="https://eprint.iacr.org/2017/634.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BDKLLSSSS_SP18.bib">bibtex</a> ]</li> <li>Joppe W. Bos and Michael Naehrig and Joop van de Pol: <a href="https://doi.org/10.1504/IJACT.2017.089353"><em>Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective</em></a>. International Journal of Applied Cryptography, InderScience Publishers, Volume 3, Issue 4, pp. 313-329, 2018.<br /> [ <a href="https://eprint.iacr.org/2014/880.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BNP_JoAC17.bib">bibtex</a> ] [ <a href="https://www.joppebos.com/src/ParallelGaussSieve-1.0.tgz">source code</a> ]</li> </ul> <h2 id="2017">2017</h2> <ul> <li>Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko and Frederik Vercauteren: <a href="https://link.springer.com/chapter/10.1007/978-3-319-66787-4_28"><em>Faster Homomorphic Function Evaluation using Non-Integral Base Encoding</em></a>. Cryptographic Hardware and Embedded Systems - CHES 2017, Lecture Notes in Computer Science 10529, pp. 579-600, Springer, 2017.<br /> [ <a href="https://eprint.iacr.org/2017/333.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BBBCIV_CHES17.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Wouter Castryck, Ilia Iliashenko and Frederik Vercauteren: <a href="https://link.springer.com/chapter/10.1007/978-3-319-57339-7_11"><em>Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling</em></a>. AFRICACRYPT 2017, Lecture Notes in Computer Science 10239, pp. 184-201, Springer, 2017.<br /> [ <a href="https://eprint.iacr.org/2016/1117.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCIV_AFRICACRYPT17.bib">bibtex</a> ]</li> <li>Joppe W. Bos and Simon Friedberger, <a href="https://ieeexplore.ieee.org/document/8023082/"><em>Fast Arithmetic Modulo 2<sup>x</sup>p<sup>y</sup>±1</em></a> IEEE Symposium on Computer Arithmetic - ARITH-20, pp. 148-155, IEEE Computer Society, 2017.<br /> [ <a href="https://eprint.iacr.org/2016/986.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BF_ARITH17.bib">bibtex</a> ]</li> <li>Paul Bottinelli and Joppe W. Bos: <a href="https://link.springer.com/article/10.1007%2Fs13389-016-0122-9"><em>Computational Aspects of Correlation Power Analysis</em></a>. Journal of Cryptographic Engineering, Volume 7, Issue 3, pp 167-181, Springer, 2017.<br /> [ <a href="https://eprint.iacr.org/2015/260.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BB_JCEN16.bib">bibtex</a> ] [ <a href="https://github.com/SideChannelMarvels/Daredevil">source code</a> ]</li> </ul> <h2 id="2016">2016</h2> <ul> <li>Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan and Douglas Stebila: <a href="https://dl.acm.org/citation.cfm?id=2978425"><em>Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE</em></a>. Conference on Computer and Communications Security (ACM CCS), pp. 1006-1018, ACM, 2016.<br /> [ <a href="https://eprint.iacr.org/2016/659.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCDMNNRS_CCS16.bib">bibtex</a> ] [ <a href="https://github.com/lwe-frodo/lwe-frodo">source code</a> ]</li> <li>Joppe W. Bos, Charles Hubain, Wil Michiels, and Philippe Teuwen: <a href="https://link.springer.com/chapter/10.1007/978-3-662-53140-2_11"><em>Differential Computation Analysis: Hiding your White-Box Designs is Not Enough</em></a>. Cryptographic Hardware and Embedded Systems - CHES 2016, Lecture Notes in Computer Science 9813, pp. 215-236, Springer, 2016.<br /> [ <a href="https://eprint.iacr.org/2015/753.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BHMT_CHES16.bib">bibtex</a> ] [ <a href="https://github.com/SideChannelMarvels">source code</a> ]</li> <li>Joppe W. Bos, Craig Costello, Huseyin Hisil, and Kristin Lauter: <a href="https://dx.doi.org/10.1007/s00145-014-9188-7"><em>Fast Cryptography in Genus 2</em></a>. Journal of Cryptology, volume 29, issue 1, pp. 28-60, Springer, 2016.<br /> [ <a href="https://eprint.iacr.org/2012/670.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCHL_JOC16.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Craig Costello, Patrick Longa, and Michael Naehrig: <a href="https://link.springer.com/article/10.1007/s13389-015-0097-y"><em>Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis</em></a>. Journal of Cryptographic Engineering, Volume 6, Issue 4, pp. 259-286, Springer, 2016. [ <a href="https://eprint.iacr.org/2014/130.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCLN_JCEN15.bib">bibtex</a> ]</li> </ul> <h2 id="2015">2015</h2> <ul> <li>Joppe W. Bos, Craig Costello, Michael Naehrig, and Douglas Stebila: <a href="https://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7163047"><em>Post-quantum key exchange for the TLS protocol from the ring learning with errors problem</em></a>. IEEE Symposium on Security and Privacy - S&amp;P, pp. 553-570, IEEE Computer Society, 2015.<br /> [ <a href="https://eprint.iacr.org/2014/599.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCNS_SP15.bib">bibtex</a> ] [ <a href="https://github.com/dstebila/rlwekex">source code</a> ]</li> </ul> <h2 id="2014">2014</h2> <ul> <li>Thorsten Kleinjung, Joppe W. Bos and Arjen K. Lenstra: <a href="https://dx.doi.org/10.1007/978-3-662-45611-8_19"><em>Mersenne factorization factory</em></a>. ASIACRYPT 2014, Part I, Lecture Notes in Computer Science 8873, pp. 358-377, Springer, 2014.<br /> [ <a href="https://eprint.iacr.org/2014/653.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/KBL_ASIACRYPT14.bib">bibtex</a> ]</li> <li>Joppe W. Bos: <a href="https://dx.doi.org/10.1007/s13389-014-0084-8"><em>Constant Time Modular Inversion</em></a>. Journal of Cryptographic Engineering, Volume 4, Issue 4, pp. 275-281, Springer, 2014.<br /> [ <a href="https://www.joppebos.com/files/CTInversion.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/B_JCEN14.bib">bibtex</a> ]</li> <li>Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, and Arjen K. Lenstra: <a href="https://dx.doi.org/10.1007/978-3-662-44709-3_19"><em>Cofactorization on Graphics Processing Units</em></a>. Cryptographic Hardware and Embedded Systems - CHES 2014, Lecture Notes in Computer Science 8731, pp. 335-352, Springer, 2014.<br /> [ <a href="https://eprint.iacr.org/2014/397.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/MBKL_CHES14.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Kristin Lauter, and Michael Naehrig: <a href="https://dx.doi.org/10.1016/j.jbi.2014.04.003"><em>Private Predictive Analysis on Encrypted Medical Data</em></a>. Journal of Biomedical Informatics, volume 50, pp. 234-243, 2014.<br /> [ <a href="https://eprint.iacr.org/2014/336.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BLN_JBI14.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Alina Dudeanu, and Dimitar Jetchev: <a href="https://dx.doi.org/10.1515/jmc-2012-0032"><em>Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms</em></a>. Journal of Mathematical Cryptology, Volume 8, Issue 1, pp. 71-92, de Gruyter, 2014.<br /> [ <a href="https://eprint.iacr.org/2012/087.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BDJ_JMC14.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Craig Costello, and Andrea Miele: <a href="https://dx.doi.org/10.1007/978-3-642-54631-0_12"><em>Elliptic and Hyperelliptic Curves: a Practical Security Analysis</em></a>. Public-Key Cryptography - PKC 2014, Lecture Notes in Computer Science 8383, pp. 203-220, Springer, 2014.<br /> [ <a href="https://eprint.iacr.org/2013/644.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCM_PKC14.bib">bibtex</a> ]</li> <li>Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, and Eric Wustrow: <a href="https://dx.doi.org/10.1007/978-3-662-45472-5_11"><em>Elliptic Curve Cryptography in Practice</em></a>. Financial Cryptography and Data Security 2014, Lecture Notes in Computer Science 8437, pp. 1-18, Springer, 2014. [ <a href="https://eprint.iacr.org/2013/734.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BHHMNW_FC14.bib">bibtex</a> ]</li> </ul> <h2 id="2013">2013</h2> <ul> <li>Joppe W. Bos, Kristin Lauter, Jake Loftus, and Michael Naehrig: <a href="https://dx.doi.org/10.1007/978-3-642-45239-0_4"><em>Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme</em></a>. Cryptography and Coding 2013, Lecture Notes in Computer Science 8308, pp. 45-64, Springer, 2013.<br /> [ <a href="https://eprint.iacr.org/2013/075.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BLLN_IMA13.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, and Greg Zaverucha: <a href="https://dx.doi.org/10.1007/978-3-662-43414-7_24"><em>Montgomery Multiplication Using Vector Instructions</em></a>. Selected Areas in Cryptography – SAC 2013, Lecture Notes in Computer Science 8282, pp. 471-489, Springer, 2014.<br /> [ <a href="https://eprint.iacr.org/2013/519.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BMSZ_SAC13.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Craig Costello, and Michael Naehrig: <a href="https://dx.doi.org/10.1007/978-3-662-43414-7_22"><em>Exponentiating in Pairing Groups</em></a>. Selected Areas in Cryptography – SAC 2013, Lecture Notes in Computer Science 8282, pp. 438-455, Springer, 2014.<br /> [ <a href="https://eprint.iacr.org/2013/458.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCM_SAC13.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Craig Costello, Huseyin Hisil, and Kristin Lauter: <a href="https://dx.doi.org/10.1007/978-3-642-40349-1_19"><em>High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition</em></a>. Cryptographic Hardware and Embedded Systems – CHES 2013, Lecture Notes in Computer Science 8086, pp. 331-348, Springer, 2013.<br /> [ <a href="https://eprint.iacr.org/2013/146.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCHL_CHES13.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Craig Costello, Huseyin Hisil, and Kristin Lauter: <a href="https://dx.doi.org/10.1007/978-3-642-38348-9_12"><em>Fast Cryptography in Genus 2</em></a>. EUROCRYPT 2013, Lecture Notes in Computer Science 7881, pp. 194-210, Springer, 2013.<br /> [ <a href="https://eprint.iacr.org/2012/670.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCHL_EUR13.bib">bibtex</a> ]</li> </ul> <h2 id="2012">2012</h2> <ul> <li>Joppe W. Bos and Thorsten Kleinjung: <a href="https://dx.doi.org/10.1007/978-3-642-34961-4_29"><em>ECM at Work</em></a>. ASIACRYPT 2012, Lecture Notes in Computer Science 7658, pp. 467-484, Springer, 2012.<br /> [ <a href="https://eprint.iacr.org/2012/089.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BK_ASIA12.bib">bibtex</a> ] [ <a href="https://www.joppebos.com/ecmatwork.html">project page</a> ]</li> <li>Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, and Christophe Wachter: <a href="https://dx.doi.org/10.1007/978-3-642-32009-5_37"><em>Public Keys</em></a>. CRYPTO 2012, Lecture Notes in Computer Science 7417, pp. 626-642, Springer, 2012.<br /> [ <a href="https://eprint.iacr.org/2012/064.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/LHABKW_CR12.bib">bibtex</a> ]</li> <li>Joppe W. Bos: <a href="https://dx.doi.org/10.1007/s10766-012-0198-5"><em>Low-Latency Elliptic Curve Scalar Multiplication</em></a>. International Journal of Parallel Programming, vol. 40, no. 5, pp. 532-550, Springer, 2012.<br /> [ <a href="https://www.joppebos.com/files/jb_lowlatency.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/B_IJPP12.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, and Peter L. Montgomery: <a href="https://dx.doi.org/10.1504/IJACT.2012.045590"><em>Solving a 112-bit Prime Elliptic Curve Discrete Logarithm Problem on Game Consoles using Sloppy Reduction</em></a>. International Journal of Applied Cryptography, vol. 2, no. 3, pp. 212-228, Inderscience Enterprises Ltd., 2012.<br /> [ <a href="https://www.joppebos.com/files/noan112.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BKKLM_IJAC12.bib">bibtex</a> ]</li> <li>Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, and Peter L. Montgomery: <a href="https://dx.doi.org/10.2140/obs.2013.1.63"><em>Finding ECM-Friendly Curves through a Study of Galois Properties</em></a>. Algorithmic Number Theory Symposium – ANTS-X, The Open Book Series 1, pp. 63-86, Mathematical Science Publishers, 2012.<br /> [ <a href="https://msp.org/obs/2013/1-1/obs-v1-n1-p04-s.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BBBKM_ANTS12.bib">bibtex</a> ]</li> <li>Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra, Dag Arne Osvik, Kazumaro Aoki, Scott Contini, Jens Franke, Emmanuel Thomé, Pascal Jermini, Michela Thiémard, Paul Leyland, Peter L. Montgomery, Andrey Timofeev, and Heinz Stockinger: <a href="https://dx.doi.org/10.1007/s10586-010-0149-0"><em>A heterogeneous computing environment to solve the 768-bit RSA challenge</em></a>. Cluster Computing, vol. 15, no. 1, pp. 53-68, Springer, 2012<br /> [ <a href="https://www.joppebos.com/files/hetero.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/KBLOACFTJTLMTS_CLUSTER12.bib">bibtex</a> ]</li> </ul> <h2 id="2011">2011</h2> <ul> <li>Joppe W. Bos, Onur Özen, and Martijn Stam: <a href="https://dx.doi.org/10.1007/978-3-642-23951-9_33"><em>Efficient Hashing using the AES Instruction Set</em></a>. Cryptographic Hardware and Embedded Systems – CHES 2011, Lecture Notes in Computer Science 6917, pp. 507-522, Springer, 2011.<br /> [ <a href="https://eprint.iacr.org/2010/576.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BOS_CHES11.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra, and Peter L. Montgomery: <a href="https://dx.doi.org/10.1109/ARITH.2011.37"><em>Efficient SIMD Arithmetic modulo a Mersenne Number</em></a>. IEEE Symposium on Computer Arithmetic – ARITH-20, pp. 213-221, IEEE Computer Society, 2011.<br /> [ <a href="https://eprint.iacr.org/2010/338.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BKLM_ARITH11.bib">bibtex</a> ]</li> </ul> <h2 id="2010">2010</h2> <ul> <li>Joppe W. Bos and Deian Stefan: <a href="https://dx.doi.org/10.1007/978-3-642-15031-9_19"><em>Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures</em></a>. Cryptographic Hardware and Embedded Systems – CHES 2010, Lecture Notes in Computer Science 6225, pp. 279-293, Springer, 2010.<br /> [ <a href="https://www.joppebos.com/files/exotic.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BS10_CHES10.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Thorsten Kleinjung, and Arjen K. Lenstra: <a href="https://dx.doi.org/10.1007/978-3-642-14518-6_9"><em>On the Use of the Negation Map in the Pollard Rho Method</em></a>. Algorithmic Number Theory – ANTS-IX, Lecture Notes in Computer Science 6197, pp. 66-82, Springer, 2010.<br /> [ <a href="https://www.joppebos.com/files/negation.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BKL_ANTS10.bib">bibtex</a> ]</li> <li>Joppe W. Bos and Marcelo E. Kaihara: <a href="https://dx.doi.org/10.1007/978-3-642-14390-8_50"><em>Montgomery Multiplication on the Cell</em></a>. Parallel Processing and Applied Mathematics – PPAM 2009, Lecture Notes in Computer Science 6067, pp. 477-485, Springer, 2010.<br /> [ <a href="https://www.joppebos.com/files/CP12.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BK_PPAM09.bib">bibtex</a> ]</li> <li>Dag Arne Osvik, Joppe W. Bos, Deian Stefan, and David Canright: <a href="https://dx.doi.org/10.1007/978-3-642-13858-4_5"><em>Fast Software AES Encryption</em></a>. Fast Software Encryption – FSE 2010, Lecture Notes in Computer Science 6147, pp. 75-93, Springer, 2010.<br /> [ <a href="https://www.joppebos.com/files/osvik_2010_fast.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/OBSC_FSE10.bib">bibtex</a> ]</li> <li>Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, and Paul Zimmermann: <a href="https://dx.doi.org/10.1007/978-3-642-14623-7_18"><em>Factorization of a 768-bit RSA modulus</em></a>. CRYPTO 2010, Lecture Notes in Computer Science 6223, pp. 333-350, Springer, 2010.<br /> [ <a href="https://eprint.iacr.org/2010/006.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/KAFLTBGKMORTZ_C10.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe: <a href="https://dx.doi.org/10.1007/978-3-642-12678-9_14"><em>ECC2K-130 on Cell CPUs</em></a>. Africacrypt 2010, Lecture Notes in Computer Science 6055, pp. 225-242, Springer, 2010.<br /> [ <a href="https://eprint.iacr.org/2010/077.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BKNS_AFCR10.bib">bibtex</a> ]</li> <li>Joppe W. Bos: <a href="https://dx.doi.org/10.1007/978-3-642-13797-6_2"><em>High-Performance Modular Multiplication on the Cell Processor</em></a>. Workshop on the Arithmetic of Finite Fields – WAIFI 2010, Lecture Notes in Computer Science 6087, pp. 7-24, Springer, 2010.<br /> [ <a href="https://www.joppebos.com/files/waifi09.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/B_WAIFI10.bib">bibtex</a> ]</li> </ul> <h2 id="2009">2009</h2> <ul> <li>Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, and Bo-Yin Yang: <a href="https://eprint.iacr.org/2009/541"><em>Breaking ECC2K-130</em></a>. Cryptology ePrint Archive, Report 2009/541, IACR, 2009<br /> [ <a href="https://eprint.iacr.org/2009/541.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BBBBBCCDMPFGGKLMNPRSUHY_EPRINT09.bib">bibtex</a> ]</li> <li>Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, and Leif Uhsadel: <a href="https://www.hyperelliptic.org/tanja/SHARCS/start09.html"><em>The Certicom Challenges ECC2-X</em></a>. Special-purpose Hardware for Attacking Cryptographic Systems – SHARCS 2009, pp. 51-82, 2009<br /> [ <a href="https://eprint.iacr.org/2009/466.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BBBBBBDMFGGKLMPRSU_SHARCS09.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Marcelo E. Kaihara, and Peter L. Montgomery: <a href="https://www.hyperelliptic.org/tanja/SHARCS/start09.html"><em>Pollard Rho on the PlayStation 3</em></a>. Special-purpose Hardware for Attacking Cryptographic Systems – SHARCS 2009, pp. 35-50, 2009.<br /> [ <a href="https://www.joppebos.com/files/rho_ps3.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BKM_SHARCS09.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, and Peter L. Montgomery: <a href="https://eprint.iacr.org/2009/389"><em>On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography</em></a>. Cryptology ePrint Archive, Report 2009/389, IACR, 2009.<br /> [ <a href="https://eprint.iacr.org/2009/389.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BKKLM_EPRINT09.bib">bibtex</a> ]</li> <li>Joppe W. Bos, Onur Özen, and Jean-Pierre Hubaux: <a href="https://dx.doi.org/10.1007/978-3-642-04474-8_2"><em>Analysis and Optimization of Cryptographically Generated Addresses</em></a>. Information Security Conference – ISC 2009, Lecture Notes in Computer Science 5735, pp. 17-32, Springer, 2009.<br /> [ <a href="https://www.joppebos.com/files/secowinet.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BOH_ISC09.bib">bibtex</a> ]</li> </ul> <h2 id="2008">2008</h2> <ul> <li>Joppe W. Bos, Nathalie Casati, and Dag Arne Osvik: <a href="https://www.joppebos.com/files/PARA2008.pdf"><em>Multi-Stream Hashing on the PlayStation 3</em></a>. Scientific and Parallel Computing – PARA 2008, Lecture Notes in Computer Science, Springer.<br /> [ <a href="https://www.joppebos.com/files/PARA2008.pdf">pdf</a> ] [ <a href="https://www.joppebos.com/bibtex/BCO_PARA08.bib">bibtex</a> ]</li> </ul> </div> </div> <div class="page__footer"> <footer> <!-- start custom footer snippets --> <!-- end custom footer snippets --> <div class="page__footer-copyright">&copy; 2019 Joppe W. Bos. Powered by <a href="https://jekyllrb.com" rel="nofollow">Jekyll</a> &amp; <a href="https://github.com/academicpages/academicpages.github.io">AcademicPages</a>, a fork of <a href="https://mademistakes.com/work/minimal-mistakes-jekyll-theme/" rel="nofollow">Minimal Mistakes</a>.</div> </footer> </div> <script src="https://www.joppebos.com//assets/js/main.min.js"></script> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=UA-50065901-1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-50065901-1'); </script> </body> <script>'undefined'=== typeof _trfq || (window._trfq = []);'undefined'=== typeof _trfd && (window._trfd=[]),_trfd.push({'tccl.baseHost':'secureserver.net'},{'ap':'cpsh-oh'},{'server':'p3plzcpnl505082'},{'dcenter':'p3'},{'cp_id':'402087'},{'cp_cache':''},{'cp_cl':'8'}) // Monitoring performance to make your website faster. If you want to opt-out, please contact web hosting support.</script><script src='https://img1.wsimg.com/traffic-assets/js/tccl.min.js'></script></html>

Pages: 1 2 3 4 5 6 7 8 9 10