“Ooh Aah... Just a Little Bit”: a small amount of side channel can go a long way N Benger, J Pol, NP Smart, Y Yarom International Workshop on Cryptographic Hardware and Embedded Systems, 75-92, 2014 | 281 | 2014 |
Finding shortest lattice vectors faster using quantum search T Laarhoven, M Mosca, J Van De Pol Designs, Codes and Cryptography 77 (2-3), 375-400, 2015 | 150 | 2015 |
Amplifying side channels through performance degradation T Allan, BB Brumley, K Falkner, J van de Pol, Y Yarom Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 130 | 2016 |
Just a little bit more J Pol, NP Smart, Y Yarom Cryptographers’ Track at the RSA Conference, 3-21, 2015 | 101* | 2015 |
Estimating key sizes for high dimensional lattice-based systems J van de Pol, NP Smart IMA International Conference on Cryptography and Coding, 290-303, 2013 | 57 | 2013 |
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems. T Laarhoven, J van de Pol, B de Weger IACR Cryptology ePrint Archive 2012, 533, 2012 | 55 | 2012 |
Sieving for shortest vectors in ideal lattices: a practical perspective JW Bos, M Naehrig, JVD Pol International Journal of Applied Cryptography 3 (4), 313-329, 2017 | 49 | 2017 |
Solving the shortest vector problem in lattices faster using quantum search T Laarhoven, M Mosca, J Pol International Workshop on Post-Quantum Cryptography, 83-101, 2013 | 47 | 2013 |
Lattice-based cryptography J van de Pol Master's thesis, Eindhoven University of Technology, 2011 | 32 | 2011 |
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q E Orsini, J van de Pol, NP Smart IACR International Workshop on Public Key Cryptography, 673-698, 2015 | 20 | 2015 |
Finding shortest lattice vectors faster using quantum search T Laarhoven, M Mosca, J van de Pol Cryptology ePrint Archive, 2014 | 9 | 2014 |
Quantifying the security of lattice-based cryptosystems in practice J van de Pol Mathematical and Statistical Aspects of Cryptography, 2012 | 5 | 2012 |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding Y Zhou, J van de Pol, Y Yu, FX Standaert International Conference on the Theory and Application of Cryptology and …, 2022 | 3 | 2022 |
Bootstrapping BGV ciphertexts with a wider choice of p and q E Orsini, J van de Pol, NP Smart IET Information Security 10 (6), 348-357, 2016 | 3 | 2016 |
Lattice-based cryptanalysis J Pol University of Bristol, 2015 | 3 | 2015 |
Compilation of Public Comments on NISTIR 8214C ipd FA Thompson, FS Ranellucci, FF Sudia, FJ Miller, J van de Pol, ... | | |
Quantum Cryptanalysis of Post-Quantum Cryptography T Laarhoven, M Mosca, J van de Pol | | |