Contact information
Cell/SMS: +1 650 387 7507
email:
AIM: jphughes@mac.com
Skype: james.p.hughes
Blog: CryptoClarityLLC
|
Close Help |
Contact information
Cell/SMS: +1 650 387 7507
email:
AIM: jphughes@mac.com
Skype: james.p.hughes
Blog: CryptoClarityLLC
J. Hughes, G. Morton, J.
Pechanec, C. Schuba, L.
Spracklen, B. Yenduri, Transparent
Multi-core Cryptographic Support on Niagara CMT
Processors, Proceedings
of the Second International Workshop on Multicore
Software Engineering (IWMSE09),
co-located with the 31st
International Conference on Software Engineering
(ICSE), May 16-24, 2009, Vancouver,
Canada, pdf
A. Lenstra, E. Tromer, A.
Shamir, W. Kortsmit, B. Dodson, J. Hughes, P.
Leyland, Factoring estimates for a 1024-bit
RSA modulus, AsiaCrypt
2003, Lecture Notes in Computer Science,
Springer-Verlag, New York 2002, November,
2003, Taipei, Taiwan, pdf
J. Hughes, J. Cole, Security
In Storage, IEEE
COMPUTER, January
2003 (Vol. 36, No. 1), (Copyright IEEE pdf).
J. Hughes, A Tannenbaum, Length-Based
Attacks for Certain Group Based Encryption Rewriting
Systems, Workshop
SECI02 SEcurité de la Communication sur Intenet,
September, 2002, Tunis, Tunisa, Updated
pdf
A. Apvrille, J. Hughes, A Time
Stamped Virtual WORM System, Workshop
SECI02 SEcurité de la Communication sur Intenet,
September, 2002, Tunis, Tunisa, pdf
J. Hughes, A Linear
Algebraic Attack on the AAFG1 Braid Group
Cryptosystem, The 7th
Australasian Conference on Information Security and
Privacy ACISP 2002, Lecture Notes in
Computer Science, vol. 2384, pp. 176--189,
Springer-Verlag, New York 2002. pdf
J. Hughes, C. Milligan, J.
Debiez, High Performance RAIT , Tenth
NASA Goddard Conference on Mass Storage Systems and
Technologies and Nineteenth IEEE Symposium on Mass
Storage Systems, Adelphi, Maryland, USA, April
2002, pdf
J. Hughes, C. Feist, Architecture
of the secure file system,
Proceedings of the Eighteenth
IEEE Symposium on Mass Storage Systems. San
Diego, CA, April 2001, Pages: 277–290, pdf
J. Hughes, A.
Tannenbaum, Length-based attacks for
certain group based encryption rewriting systems, Institute
for Mathematics and Its Applications, April,
2000, Minneapolis, MN, Preprint number 1696, ISBN to
be supplied. Postscript, pdf.
J. Hughes, M. O'Keefe, C.
Feist, S. Hawkinson, J. Perrault, D. Corcoran, A
Universal Access, Smart-Card-Based, Secure File
System , Atlanta
Linux Showcase , October, 1999, Atlanta, GA. Postscript, pdf.
Stone, J.; Greenwald, M.;
Partridge, C.; Hughes, J. Performance
of checksums and CRCs over real data,
IEEE/ACM Transactions on Networking, Oct, 1998,
Volume: 6 Number:5 , Pages: 529 -543. pdf
J. Hughes, From
Secure Networks to Secure Storage,
StorageTek Insight, The Storage Technology
Corporation Technical Journal, Vol. 1 No. 1,
Fall/Winter 1997-98. pdf
J. Hughes, A. Guha, Realizing
Global Shared Data Space: the Role of Data Rate and
Security, Gigabit
Networking Workshop GBN'97.
(Abstract html),
(Foils postscript , pdf )
J. Hughes, A. Guha, Task
Force on Network Storage Architecture: Information
Security, The 30th
Hawaii International Conf. on Systems Sciences, Task
Force on Network Storage Architecture, Jan.
1997. pdf.
J. Hughes, Combined
DES-CBC, HMAC and Replay Prevention Security
Transform, 36th IETF, June 1996, Montreal,
Canada. text, html.
J. Hughes, IP
Security, Creating Secure Intranets over the
Internet,INET '96, Spring
1996, Montreal, Canada. html, postscript, pdf
J. Hughes, A High
Speed Firewall Architecture for ATM OC-3c, Interop
Engineering Conference, Spring 1996, Las Vegas. html , postscript , pdf
C. Partridge, J. Hughes, J.
Stone, Performance of Checksums and CRCs
over Real Data, ACM SIGCOMM '95, Cambridge.
postscript, pdf
A. Guha, J. Hughes, Cost
Effective Use of ATM Bandwidth,1995
IEEE Gigabit Networking Workshop.
J. Hughes, W. Franta, Geographic
Extension of HIPPI over High Speed SONET. IEEE
Network, May/June 1994, Vol. 8 no. 3. postscript , pdf
W. Franta, J. Halpern, J.
Hughes, Mix and Match Technologies Boost
Communications Speed in Today's Data-Networking
Environment, Computers in Physics, Volume: 7,
Number 6, Nov/Dec 1993. pdf
Peter A. Steenkiste, H.T.
Kung, Steven J. Schlick, Brian D. Zill, Jim Hughes,
Bob Kowalski, John Mullaney, A Host
Interface Architecture for High-Speed Networks. 4th
IFIP conference on High Performance Networking,
Liege, Belgium, December 1992. postscript, pdf
W. Franta, J. Hughes, Extended
High Speed Networks Employing HIPPI Switches, High
Speed WANs and FDDI Rings. Journal
of High Speed Networks, Volume: 1, Number 2, 1992. pdf
J. Hughes. HIPPI. In
Proceedings of the 17th Conference on Local Computer
Networks. IEEE, October 1992. pdf
Presentations
J. Hughes, Storage
Encryption algorithms and standards, 22nd
IEEE - 13th NASA Goddard,Conference on Mass Storage
Systems and Technologies (MSST2005), April
2005, pdf
J. Hughes, Encrypted
Storage, Twentieth
IEEE/Eleventh NASA Goddard Conference on Mass
Storage Systems & Technologies MSST2003, May
2003, pdf
J. Hughes, The
LeftSSS attack on Ko-Lee-Cheon-Han-Kang-Park Key
Agreement Protocol in B45, Rump
Session Crypto
2000 , May, 2000, pdf
J. Hughes, Arithmetica
Key Agreement Protocol, Rump
Session Eurocrypt
2000 , May, 2000, pdf
J. Hughes, What
SANs can learn from LANs,
Keynote at the http://storageconference.org/2000/http://storageconference.org/2000/, March,
2000, pdf
J. Hughes, M. O'Keefe, C.
Feist, S. Hawkinson, J. Perrault, D. Corcoran, Secure
File System, RSA 2000 , Feburary 2000, pdf
J. Hughes, The ATM
Firewall. Interop Engineering Conference,
1996. postscript , pdf
Code
J. Hughes, The
Illustrated DES Spreadsheet, 2004. xls
J. Hughes, SMS4
Cipher as a Spreadsheet, 2009. xls
Patents
Query US Patent Office for
issued patents and
pending applications
Previous versions
•At
Network Systems, 2000-2003
•At
Network Systems, 2002-2005
•At
StorageTek, 2004-2007
•At Sun Microsystems, 2005-2009