Follow
James Howe
James Howe
Staff Research Scientist, SandboxAQ
Verified email at sandboxaq.com - Homepage
Title
Cited by
Cited by
Year
On practical discrete Gaussian samplers for lattice-based cryptography
J Howe, A Khalid, C Rafferty, F Regazzoni, M O’Neill
IEEE Transactions on Computers 67 (3), 322-334, 2016
1022016
Standard Lattice-Based Key Encapsulation on Embedded Devices
J Howe, T Oder, M Krausz, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 372-393, 2018
822018
Practical Lattice-based Digital Signature Schemes
J Howe, T Poeppelmann, M O’Neill, E O’Sullivan, T Gueneysu
ACM Transactions on Embedded Computing Systems 14, 24, 2015
762015
Lattice-based encryption over standard lattices in hardware
J Howe, C Moore, M O'Neill, F Regazzoni, T Güneysu, K Beeden
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
602016
Side-channel Assisted Existential Forgery Attack on Dilithium-A NIST PQC candidate
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
572018
Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
492019
The Return of the SDitH
C Aguilar-Melchor, N Gama, J Howe, A Hülsing, D Joseph, D Yue
Annual International Conference on the Theory and Applications of …, 2023
452023
Isochronous Gaussian Sampling: From Inception to Implementation: With Applications to the Falcon Signature Scheme
J Howe, T Prest, T Ricosset, M Rossi
Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020
432020
Toward a queer digital humanities
B Ruberg, J Boyd, J Howe
Bodies of information: Intersectional feminism and the digital humanities …, 2018
382018
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
S McCarthy, J Howe, N Smyth, S Brannigan, M O’Neill
16th International Joint Conference on e-Business and Telecommunications …, 2019
312019
SoK: How (not) to Design and Implement Post-Quantum Cryptography
J Howe, T Prest, D Apon
Cryptographers' Track at the RSA Conference, 2021
262021
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
J Howe, A Khalid, M Martinoli, F Regazzoni, E Oswald
2019 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2019
252019
Compact, scalable, and efficient discrete Gaussian samplers for lattice-based cryptography
A Khalid, J Howe, C Rafferty, F Regazzoni, M O'Neill
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
222018
Lightweight hardware implementation of R-LWE lattice-based cryptography
S Fan, W Liu, J Howe, A Khalid, M O’Neill
2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 403-406, 2018
212018
Lattice-based Key-sharing Schemes: A Survey
P Ravi, J Howe, A Chattopadhyay, S Bhasin
ACM Computing Surveys (CSUR) 54 (1), 1-39, 2021
202021
Time-independent discrete Gaussian sampling for post-quantum cryptography
A Khalid, J Howe, C Rafferty, M O'Neill
2016 International Conference on Field-Programmable Technology (FPT), 241-244, 2016
202016
Optimised lattice-based key encapsulation in hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
NIST’s Second PQC Standardization Conference 2019, 13, 2019
172019
Benchmarking and Analysing NIST PQC Lattice-Based Signature Scheme Standards on the ARM Cortex M7
J Howe, B Westerbaan
International Conference on Cryptology in Africa, 2023
15*2023
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
J Howe, M Martinoli, E Oswald, F Regazzoni
Journal of Cryptographic Engineering 11 (4), 317-327, 2021
152021
Attacks on NIST PQC 3rd Round Candidates
D Apon, J Howe
IACR Real World Crypto Symposium 10, 2021
14*2021
The system can't perform the operation now. Try again later.
Articles 1–20