Factorization of a 768-Bit RSA Modulus. T Kleinjung, K Aoki, J Franke, AK Lenstra, E Thomé, JW Bos, P Gaudry, ... Crypto 6223, 333-350, 2010 | 650 | 2010 |
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ... 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 353-367, 2018 | 541 | 2018 |
Improved security for a ring-based fully homomorphic encryption scheme JW Bos, K Lauter, J Loftus, M Naehrig Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013 | 505 | 2013 |
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem JW Bos, C Costello, M Naehrig, D Stebila 2015 IEEE Symposium on Security and Privacy, 553-570, 2015 | 417 | 2015 |
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ... Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 414 | 2016 |
Public keys AK Lenstra, JP Hughes, M Augier, JW Bos, T Kleinjung, C Wachter Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 336* | 2012 |
Elliptic Curve Cryptography in Practice JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow Financial Cryptography and Data Security, 2013 | 321 | 2013 |
Private Predictive Analysis on Encrypted Medical Data JW Bos, K Lauter, M Naehrig Journal of Biomedical Informatics, 2014 | 292 | 2014 |
Fast software AES encryption DA Osvik, JW Bos, D Stefan, D Canright Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 245* | 2010 |
Differential computation analysis: Hiding your white-box designs is not enough JW Bos, C Hubain, W Michiels, P Teuwen Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 133 | 2016 |
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis JW Bos, C Costello, P Longa, M Naehrig | 127 | 2014 |
CRYSTALS-Kyber algorithm specifications and supporting documentation R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ... NIST PQC Round 2 (4), 1-43, 2017 | 126 | 2017 |
Fast cryptography in genus 2 JW Bos, C Costello, H Hisil, K Lauter Journal of Cryptology 29, 28-60, 2016 | 106 | 2016 |
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography J Bos, M Kaihara, T Kleinjung, AK Lenstra, PL Montgomery | 102 | 2009 |
Crystals-kyber P Schwabe, R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, ... National Institute of Standards and Technology, Tech. Rep, 2020 | 86 | 2020 |
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction JW Bos, ME Kaihara, T Kleinjung, AK Lenstra, PL Montgomery International Journal of Applied Cryptography 2 (3), 212-228, 2012 | 85 | 2012 |
Breaking ecc2k-130 DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ... Cryptology EPrint Archive, 2009 | 74 | 2009 |
FrodoKEM M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ... Technical report, National Institute of Standards and Technology, 2017 | 66 | 2017 |
Managed secure computations on encrypted data JJ Loftus, M Naehrig, JW Bos, KE Lauter US Patent 9,306,738, 2016 | 60 | 2016 |
Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling JW Bos, W Castryck, I Iliashenko, F Vercauteren Progress in Cryptology-AFRICACRYPT 2017: 9th International Conference on …, 2017 | 56 | 2017 |