Follow
Joop van de Pol
Joop van de Pol
Unaffiliated
Verified email at my.bristol.ac.uk
Title
Cited by
Cited by
Year
“Ooh Aah... Just a Little Bit”: a small amount of side channel can go a long way
N Benger, J Pol, NP Smart, Y Yarom
International Workshop on Cryptographic Hardware and Embedded Systems, 75-92, 2014
2762014
Finding shortest lattice vectors faster using quantum search
T Laarhoven, M Mosca, J Van De Pol
Designs, Codes and Cryptography 77 (2-3), 375-400, 2015
1482015
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
1242016
Just a little bit more
J Pol, NP Smart, Y Yarom
Cryptographers’ Track at the RSA Conference, 3-21, 2015
99*2015
Estimating key sizes for high dimensional lattice-based systems
J van de Pol, NP Smart
IMA International Conference on Cryptography and Coding, 290-303, 2013
572013
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems.
T Laarhoven, J van de Pol, B de Weger
IACR Cryptology ePrint Archive 2012, 533, 2012
542012
Sieving for shortest vectors in ideal lattices: a practical perspective
JW Bos, M Naehrig, JVD Pol
International Journal of Applied Cryptography 3 (4), 313-329, 2017
472017
Solving the shortest vector problem in lattices faster using quantum search
T Laarhoven, M Mosca, J Pol
International Workshop on Post-Quantum Cryptography, 83-101, 2013
442013
Lattice-based cryptography
J van de Pol
Master's thesis, Eindhoven University of Technology, 2011
312011
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
E Orsini, J van de Pol, NP Smart
IACR International Workshop on Public Key Cryptography, 673-698, 2015
202015
Finding shortest lattice vectors faster using quantum search
T Laarhoven, M Mosca, J van de Pol
Cryptology ePrint Archive, 2014
92014
Quantifying the security of lattice-based cryptosystems in practice
J van de Pol
Mathematical and Statistical Aspects of Cryptography, 2012
52012
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
Y Zhou, J van de Pol, Y Yu, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2022
32022
Bootstrapping BGV ciphertexts with a wider choice of p and q
E Orsini, J van de Pol, NP Smart
IET Information Security 10 (6), 348-357, 2016
32016
Lattice-based cryptanalysis
J Pol
University of Bristol, 2015
32015
Compilation of Public Comments on NISTIR 8214C ipd
FA Thompson, FS Ranellucci, FF Sudia, FJ Miller, J van de Pol, ...
Quantum Cryptanalysis of Post-Quantum Cryptography
T Laarhoven, M Mosca, J van de Pol
The system can't perform the operation now. Try again later.
Articles 1–17