[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs

T Feneuil, A Joux, M Rivain - Annual International Cryptology Conference, 2022 - Springer
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …

Efficient pseudorandom correlation generators: Silent OT extension and more

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Advances in Cryptology …, 2019 - Springer
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …

Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes

G Couteau, P Rindal, S Raghuraman - Annual International Cryptology …, 2021 - Springer
We put forth new protocols for oblivious transfer extension and vector OLE, called Silver, for
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …

Efficient two-round OT extension and silent non-interactive secure computation

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Proceedings of the …, 2019 - dl.acm.org
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …

Oblivious key-value stores and amplification for private set intersection

G Garimella, B Pinkas, M Rosulek, N Trieu… - Advances in Cryptology …, 2021 - Springer
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …

Compressing vector OLE

E Boyle, G Couteau, N Gilboa, Y Ishai - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Oblivious linear-function evaluation (OLE) is a secure two-party protocol allowing a receiver
to learn any linear combination of a pair of field elements held by a sender. OLE serves as a …

Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography

JF Biasse, X Bonnetain, E Kirshanova… - IET Information …, 2023 - Wiley Online Library
In this survey, the authors review the main quantum algorithms for solving the computational
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …

Efficient pseudorandom correlation generators from ring-LPN

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Advances in Cryptology …, 2020 - Springer
Secure multiparty computation can often utilize a trusted source of correlated randomness to
achieve better efficiency. A recent line of work, initiated by Boyle et al.(CCS 2018, Crypto …

[PDF][PDF] BIKE: bit flip** key encapsulation

N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy… - 2022 - inria.hal.science
4 Design Rationale and Considerations (2. B. 6) 11 4.1 What is BIKE and how should it be
used?............... 11 4.1. 1 What is BIKE in one sentence?................. 11 4.1. 2 How many …