Contact information

Cell/SMS: +1 650 387 7507

email:

    jphughes@mac.com

    jhughes@huawei.com

AIM: jphughes@mac.com

Skype: james.p.hughes


Blog: CryptoClarityLLC

 
 

Positions

Papers

J. Hughes, G. Morton, J. Pechanec, C. Schuba, L. Spracklen, B. Yenduri, Transparent Multi-core Cryptographic Support on Niagara CMT Processors, Proceedings of the Second International Workshop on Multicore Software Engineering (IWMSE09), co-located with the 31st International Conference on Software Engineering (ICSE), May 16-24, 2009, Vancouver, Canada, pdf

A. Lenstra, E. Tromer, A. Shamir, W. Kortsmit, B. Dodson, J. Hughes, P. Leyland, Factoring estimates for a 1024-bit RSA modulus, AsiaCrypt 2003, Lecture Notes in Computer Science, Springer-Verlag, New York  2002, November, 2003, Taipei, Taiwan, pdf

J. Hughes, J. Cole, Security In Storage, IEEE COMPUTER, January 2003 (Vol. 36, No. 1), (Copyright IEEE pdf).

J. Hughes, A Tannenbaum, Length-Based Attacks for Certain Group Based Encryption Rewriting Systems, Workshop SECI02 SEcurité de la Communication sur Intenet, September, 2002, Tunis, Tunisa, Updated pdf 

A. Apvrille, J. Hughes, A Time Stamped Virtual WORM System, Workshop SECI02 SEcurité de la Communication sur Intenet, September, 2002, Tunis, Tunisa, pdf 

J. Hughes, A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem, The 7th Australasian Conference on Information Security and Privacy ACISP 2002,  Lecture Notes in Computer Science, vol. 2384, pp. 176--189, Springer-Verlag, New York  2002. pdf

J. Hughes, C. Milligan, J. Debiez, High Performance RAITTenth NASA Goddard Conference on Mass Storage Systems and Technologies and Nineteenth IEEE Symposium on Mass Storage Systems, Adelphi, Maryland, USA, April 2002, pdf

J. Hughes, C. Feist, Architecture of the secure file system, Proceedings of the Eighteenth IEEE Symposium on Mass Storage Systems. San Diego, CA, April 2001, Pages: 277–290, pdf

J. Hughes, A. Tannenbaum,  Length-based attacks for certain group based encryption rewriting systems, Institute for Mathematics and Its Applications, April, 2000, Minneapolis, MN, Preprint number 1696, ISBN to be supplied. Postscript, pdf.

J. Hughes, M. O'Keefe, C. Feist, S. Hawkinson, J. Perrault, D. Corcoran, A Universal Access, Smart-Card-Based, Secure File System , Atlanta Linux Showcase , October, 1999, Atlanta, GA. Postscript, pdf.

Stone, J.; Greenwald, M.; Partridge, C.; Hughes, J. Performance of checksums and CRCs over real data, IEEE/ACM Transactions on Networking, Oct, 1998, Volume: 6 Number:5 , Pages: 529 -543. pdf

J. Hughes, From Secure Networks to Secure Storage, StorageTek Insight, The Storage Technology Corporation Technical Journal, Vol. 1 No. 1, Fall/Winter 1997-98. pdf

J. Hughes, A. Guha, Realizing Global Shared Data Space: the Role of Data Rate and Security, Gigabit Networking Workshop GBN'97. (Abstract html), (Foils postscript , pdf )

J. Hughes, A. Guha, Task Force on Network Storage Architecture: Information Security, The 30th Hawaii International Conf. on Systems Sciences, Task Force on Network Storage Architecture, Jan. 1997. pdf.

J. Hughes, Combined DES-CBC, HMAC and Replay Prevention Security Transform, 36th IETF, June 1996, Montreal, Canada. text, html.

J. Hughes, IP Security, Creating Secure Intranets over the Internet,INET '96, Spring 1996, Montreal, Canada. html, postscript, pdf

J. Hughes, A High Speed Firewall Architecture for ATM OC-3c, Interop Engineering Conference, Spring 1996, Las Vegas. html , postscript , pdf

C. Partridge, J. Hughes, J. Stone, Performance of Checksums and CRCs over Real Data, ACM SIGCOMM '95, Cambridge. postscript, pdf

A. Guha, J. Hughes, Cost Effective Use of ATM Bandwidth,1995 IEEE Gigabit Networking Workshop.

J. Hughes, W. Franta, Geographic Extension of HIPPI over High Speed SONET. IEEE Network, May/June 1994, Vol. 8 no. 3. postscript , pdf

W. Franta, J. Halpern, J. Hughes, Mix and Match Technologies Boost Communications Speed in Today's Data-Networking Environment, Computers in Physics, Volume: 7, Number 6, Nov/Dec 1993. pdf

Peter A. Steenkiste, H.T. Kung, Steven J. Schlick, Brian D. Zill, Jim Hughes, Bob Kowalski, John Mullaney, A Host Interface Architecture for High-Speed Networks. 4th IFIP conference on High Performance Networking, Liege, Belgium, December 1992. postscript, pdf

W. Franta, J. Hughes, Extended High Speed Networks Employing HIPPI Switches, High Speed WANs and FDDI Rings. Journal of High Speed Networks, Volume: 1, Number 2, 1992. pdf

J. Hughes. HIPPI. In Proceedings of the 17th Conference on Local Computer Networks. IEEE, October 1992. pdf

Presentations

J. Hughes, Storage Encryption algorithms and standards, 22nd IEEE - 13th NASA Goddard,Conference on Mass Storage Systems and Technologies (MSST2005), April 2005, pdf

J. Hughes, Encrypted Storage, Twentieth IEEE/Eleventh NASA Goddard Conference on Mass Storage Systems & Technologies MSST2003, May 2003, pdf


J. Hughes, The LeftSSS attack on Ko-Lee-Cheon-Han-Kang-Park Key Agreement Protocol in B45, Rump Session Crypto 2000 , May, 2000, pdf

J. Hughes, Arithmetica Key Agreement Protocol, Rump Session Eurocrypt 2000 , May, 2000, pdf

J. Hughes, What SANs can learn from LANs, Keynote at the http://storageconference.org/2000/http://storageconference.org/2000/, March, 2000, pdf

J. Hughes, M. O'Keefe, C. Feist, S. Hawkinson, J. Perrault, D. Corcoran, Secure File System, RSA 2000 , Feburary 2000, pdf

J. Hughes, The ATM Firewall. Interop Engineering Conference, 1996. postscript , pdf

Code

J. Hughes, The Illustrated DES Spreadsheet, 2004. xls

J. Hughes, SMS4 Cipher as a Spreadsheet, 2009. xls

Patents

Query US Patent Office for issued patents and pending applications

Previous versions

  1. At Network Systems, 2000-2003

  2. At Network Systems, 2002-2005

  3. At StorageTek, 2004-2007

  4. At Sun Microsystems, 2005-2009