Skip to main content

and
  1. No Access

    Reference Work Entry In depth

    Kuna

    James Howe in Encyclopedia of Sex and Gender (2004)

  2. No Access

    Article

    Most Neuropathies Are Idiopathic

    James Howe in Journal of Religion and Health (2010)

  3. No Access

    Book

  4. Article

    Foreword

    Matthias Militzer, Gianluigi Botton in Metallurgical and Materials Transactions A (2017)

  5. No Access

    Chapter and Conference Paper

    Isochronous Gaussian Sampling: From Inception to Implementation

    Gaussian sampling over the integers is a crucial tool in lattice-based cryptography, but has proven over the recent years to be surprisingly challenging to perform in a generic, efficient and provable secure m...

    James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi in Post-Quantum Cryptography (2020)

  6. No Access

    Chapter and Conference Paper

    SoK: How (not) to Design and Implement Post-quantum Cryptography

    Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel...

    James Howe, Thomas Prest, Daniel Apon in Topics in Cryptology – CT-RSA 2021 (2021)

  7. Article

    Open Access

    Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware

    FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort. A condition for these candidates is to use NIST standards for sources of random...

    James Howe, Marco Martinoli, Elisabeth Oswald in Journal of Cryptographic Engineering (2021)

  8. No Access

    Chapter and Conference Paper

    Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7

    This paper presents an analysis of the two lattice-based digital signature schemes, Dilithium and Falcon, which have been chosen by NIST for standardisation, on the ARM Cortex M7 using the STM32F767ZI NUCLEO-1...

    James Howe, Bas Westerbaan in Progress in Cryptology - AFRICACRYPT 2023 (2023)

  9. No Access

    Chapter and Conference Paper

    The Return of the SDitH

    This paper presents a code-based signature scheme based on the well-known syndrome decoding (SD) problem. The scheme builds upon a recent line of research which uses the Multi-Party-Computation-in-the-Head (MP...

    Carlos Aguilar-Melchor, Nicolas Gama, James Howe in Advances in Cryptology – EUROCRYPT 2023 (2023)

  10. No Access

    Chapter and Conference Paper

    Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC

    While hardware implementations allow the production of highly efficient and performance-oriented designs, exploiting features such as parallelization, their longer time to code and implement often bottlenecks ...

    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion in Code-Based Cryptography (2023)

  11. No Access

    Chapter and Conference Paper

    Batch Signatures, Revisited

    We revisit batch signatures (previously considered in a draft RFC and used in multiple recent works), where a single, potentially expensive, “inner” digital signature authenticates a Merkle tree constructed fr...

    Carlos Aguilar-Melchor, Martin R. Albrecht in Topics in Cryptology – CT-RSA 2024 (2024)