Joppe W. Bos
Homepage
Publications
Presentations
Montgomery Book
Presentations
2018
October 3, 2018:
Fooling Smart Machines: Security Challenges for Machine Learning
Internet & Mobile World
, Romexpo, Bucharest, Romania
2017
November 11, 2017:
Software Engineering Aspects of Elliptic Curve Cryptography
School on Elliptic Curve Cryptography
, Radboud University, Nijmegen, Netherlands
September 20, 2017:
Post-Quantum Key Exchange based on Lattices
Romanian Cryptology Days Conference
, Bucharest, Romania
January 4, 2017:
Security assessment of software security: A closer look at white-box cryptographic implementations
Real World Cryptography Conference
, Columbia University, New York City, USA
2016
September 16, 2016:
Post-Quantum Key Exchange for the Internet
Kayaks & Dreadnoughts in a sea of crypto
, Université Libre de Bruxelles, Brussels, Belgium
August 24, 2016:
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
Microsoft Research, Redmond, WA, USA (
video
)
August 18, 2016:
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, Santa Barbara, CA, USA (
video
)
August 14, 2016:
Practical white-box topics: design and attacks – part 1
White-Box Cryptography and Obfuscation (WhibOx)
, Santa Barbara, CA, USA
June 9, 2016:
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Summer school on real-world crypto and privacy
, Šibenik, Croatia.
February 10, 2016:
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Laboratory for cryptologic algorithms (LACAL)
,
École Polytechnique Fédérale de Lausanne (EPFL)
, Lausanne, Switzerland.
January 25, 2016:
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
QualSec seminars
, QualSec cryptography and computer security group,
Université Libre de Bruxelles
, Brussels, Belgium.
2015
June 12, 2015:
Elliptic Curves: a Hardware Perspective
Workshop on Elliptic Curve Cryptography Standards
, NIST, Gaithersburg, MD, USA
June 4:
Parallel Cryptanalysis
Summer school on real-world crypto and privacy
, Hotel Ivan, Šibenik, Croatia
March 25, 2015:
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Computer Security and Industrial Cryptography (COSIC)
, Leuven, Belgium
February 6, 2015:
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Special LACAL@RISC Seminar on Cryptologic Algorithms
, CWI, Amsterdam, the Netherlands
2014
July 29, 2014:
Selecting Elliptic Curves for Cryptography: an Efficiency and Security Analysis
Innovation Center Crypto & Security Colloquium, NXP Hamburg, Germany
May 7, 2014:
Elliptic and Hyperelliptic Curves: a Practical Security Analysis
Conference on the Theoretical and Practical Aspects of the Discrete Logarithm Problem
, Ascona, Switzerland (invited speaker)
March 6, 2014:
Fast Cryptography in Practice
Microsoft Research Security /Crypto Summit, Redmond, WA, USA
2013
December 12, 2013:
Elliptic Curve Cryptography in Practice
Laboratory for cryptologic algorithms (LACAL)
,
École Polytechnique Fédérale de Lausanne (EPFL)
, Lausanne, Switzerland
October 25, 2013:
Fast Cryptography in Genus 2
Microsoft Research Privacy Workshop, Redmond, WA, USA
September 17, 2013:
Fast Cryptography in Genus 2
Workshop on Elliptic Curve Cryptography (ECC)
, Leuven, Belgium (invited speaker)
August 23, 2013:
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, Santa Barbara, CA, USA
August 16, 2013:
Montgomery Multiplication Using Vector Instructions
Selected Areas in Cryptography (SAC)
, Simon Fraser University, Burnaby, Canada
March 21, 2013:
High-Performance Cryptology on GPUs
GPU Technology Conference
, San Jose, CA, USA
2012
December 18, 2012:
(Genus) 2 > (Genus) 1
Cryptography Group
,
University of Bristol
, UK
December 17, 2012:
ECM at Work
Cryptography Group
,
University of Bristol
, UK
December 12, 2012:
Homomorphic Encryption from RLWE – Schemes and Parameter
Laboratory for cryptologic algorithms (LACAL)
,
École Polytechnique Fédérale de Lausanne (EPFL)
, Lausanne, Switzerland
December 10, 2012:
(Genus) 2 > (Genus) 1
Laboratory for cryptologic algorithms (LACAL)
,
École Polytechnique Fédérale de Lausanne (EPFL)
, Lausanne, Switzerland
December 5, 2012:
ECM at Work
Asiacrypt
, Beijing, China
October 23, 2012:
RSA keys with common factors
Microsoft Research Privacy Workshop, Redmond, WA, USA
2011
December 1, 2011:
Recent Developments in ECM
Workshop on Computational Number Theory
, CWI, Amsterdam, the Netherlands
October 13, 2011:
How to solve a 112-bit ECDLP using game consoles
Microsoft Research
, Redmond, WA, USA
2010
November 25, 2010:
High-performance implementations on the Cell Broadband Engine Architecture
Cryptography Group
,
University of Bristol
, UK
August 19, 2010:
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures
Cryptographic Hardware and Embedded Systems – CHES
, Santa Barbara, California, USA
July 20, 2010:
On the Use of the Negation Map in the Pollard Rho Method
Algorithmic Number Theory Symposium – ANTS-IX
, Nancy, INRIA, France
June 28, 2010:
High-Performance Modular Multiplication on the Cell Processor
Workshop on the Arithmetic of Finite Fields – WAIFI 2010
, Istanbul, Turkey
2009
October 12, 2009:
High-Performance Modular Multiplication on the Cell Broadband Engine
Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers – SPEED-CC
, Berlin, Germany
September 9, 2009:
Pollard Rho on the PlayStation 3
Special-purpose Hardware for Attacking Cryptographic Systems – SHARCS
,
EPFL
, Lausanne, Switzerland
March 27, 2009: Cryptanalysis on a PlayStation 3 Cluster
Scientific POWER Meeting 2009
, Mazurian Lakes area, Poland
2008
October 7, 2008:
Cryptanalysis on a PlayStation 3 Cluster
CADO workshop on integer factorization
,
INRIA Nancy
, France
Design:
HTML5Templates.com