关注
Basil Hess
Basil Hess
IBM Research
在 zurich.ibm.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Supersingular isogeny key encapsulation
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
NIST, 2019
408*2019
Supersingular Isogeny Key Encapsulation-Submission to the NIST’s post-quantum cryptography standardization process, round 2 (2019)
R Azarderakhsh, M Campagna, C Costello, LD Feo, B Hess, A Jalali, ...
81*
Checkout queue virtualization system for retail establishments
B Hess, F Von Reischach, J Sutanto
US Patent 8,510,163, 2013
622013
Supersingular Isogeny Key Encapsulation. Third Round Candidate of the NIST’s post-quantum cryptography standardization process (2020)
R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, A Jalali, ...
46*
Evaluation of fine-granular GPS tracking on smartphones
B Hess, AZ Farahani, F Tschirschnitz, F von Reischach
Proceedings of the first acm sigspatial international workshop on mobile …, 2012
352012
SQIsign. Submission to NIST standardization of additional digital signature schemes
J Chavez-Saab, MCR Santos, L De Feo, JK Eriksen, B Hess, D Kohel, ...
17*2023
MAYO
W Beullens, F Campos, S Celi, B Hess, MJ Kannwischer
Specification document of NIST PQC Standardization of Additional Digital …, 2023
17*2023
PQDH: a quantum-safe replacement for Diffie-Hellman based on SIDH
V Soukharev, B Hess
Cryptology ePrint Archive, 2019
92019
A trustworthy architecture for wireless industrial sensor networks: Research roadmap of EU TWISNet trust and security project
M Wehner, S Zeisberg, A Olivereau, N Oulha, L Gheorghe, E Slusanschi, ...
2011 First SysSec Workshop, 63-66, 2011
92011
Nibbling MAYO: Optimized implementations for AVX2 and Cortex-M4
W Beullens, F Campos, S Celi, B Hess, MJ Kannwischer
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (2 …, 2024
72024
Fast quantum-safe cryptography on IBM Z
J Bradbury, B Hess
Proceedings of the 3rd NIST PQC Standardization Conference, Virtual, 7-9, 2021
72021
Supersingular isogeny key encapsulation (SIKE)
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
Submission to NIST Post-Quantum Cryptogr. Standardization 1, 2017
62017
A Business-to-Business Perspective on Mobile Application Stores
B Hess, J Sutanto, M Ameling, F von Reischach
62012
If erring is human, is system use divine? Omission errors during post-adoptive system use
L Goutas, B Hess, J Sutanto
Decision Support Systems 130, 113225, 2020
52020
Toward location-aware Web: extraction method, applications and evaluation
B Hess, F Magagna, J Sutanto
Personal and Ubiquitous Computing 18, 1047-1060, 2014
42014
A universal approach that makes legacy online content location-based
B Hess, A Gasimov, J Sutanto
proceedings of the 10th international conference on mobile and ubiquitous …, 2011
42011
Building location-aware web with salt and webnear. me
F Magagna, B Hess, J Sutanto
Procedia Computer Science 10, 601-608, 2012
32012
7 Establishing Trust in Industrial WSN
B Hess, F von Reischach, L Gheorghe
Proceedings of the User-Centered Trust in, 31, 2013
22013
Achieving targeted mobile advertisements while respecting privacy
E Palme, B Hess, J Sutanto
Mobile Computing, Applications, and Services: 4th International Conference …, 2013
22013
Analysis of mobile decision support systems in three empirical settings
BF Hess
ETH Zurich, 2014
12014
系统目前无法执行此操作,请稍后再试。
文章 1–20