Generic models for group actions

J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on Public …, 2023 - Springer
Abstract We define the Generic Group Action Model (GGAM), an adaptation of the Generic
Group Model to the setting of group actions (such as CSIDH). Compared to a previously …

[PDF][PDF] Swoosh: Practical Lattice-Based Non-Interactive Key Exchange.

P Gajland, B de Kock, M Quaresma… - IACR Cryptol. ePrint …, 2023 - core.ac.uk
The advent of quantum computers has sparked significant interest in post-quantum
cryptographic schemes, as a replacement for currently used cryptographic primitives. In this …

{SWOOSH}: Efficient {Lattice-Based}{Non-Interactive} Key Exchange

P Gajland, B de Kock, M Quaresma… - 33rd USENIX Security …, 2024 - usenix.org
The advent of quantum computers has sparked significant interest in post-quantum
cryptographic schemes, as a replacement for currently used cryptographic primitives. In this …

Tighter qcca-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model

J Ge, T Shan, R Xue - Annual International Cryptology Conference, 2023 - Springer
Abstract Hofheinz et al.(TCC 2017) proposed several key encapsulation mechanism (KEM)
variants of Fujisaki-Okamoto (FO) transformation, including and QFO m⊥, and they are …

The pre-shared key modes of HPKE

J Alwen, J Janneck, E Kiltz, B Lipp - … on the Theory and Application of …, 2023 - Springer
Abstract The Hybrid Public Key Encryption (HPKE) standard was recently published as RFC
9180 by the Crypto Forum Research Group (CFRG) of the Internet Research Task Force …

Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith

J Meers, J Nowakowski - International Conference on the Theory and …, 2023 - Springer
We define and analyze the Commutative Isogeny Hidden Number Problem which is the
natural analogue of the Hidden Number Problem in the CSIDH and CSURF setting. In short …

[BOOK][B] Public-Key Cryptography–PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10 …

A Boldyreva, V Kolesnikov - 2023 - books.google.com
The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed
proceedings of the 26th IACR International Conference on Practice and Theory of Public …

Measure-rewind-extract: Tighter proofs of one-way to hiding and CCA security in the quantum random oracle model

J Ge, H Liao, R Xue - International Conference on the Theory and …, 2025 - Springer
Abstract The One-Way to Hiding (O2H) theorem, first given by Unruh (J ACM 2015) and then
restated by Ambainis et al.(CRYPTO 2019), is a crucial technique for solving the …

Robustly Reusable Fuzzy Extractor from Isogeny

Y Zhou, S Liu, S Han - Theoretical Computer Science, 2024 - Elsevier
Abstract Robustly reusable Fuzzy Extractor (rrFE) allows multiple extractions from the same
fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …

A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions

S Galbraith, YF Lai, H Montgomery - IACR International Conference on …, 2024 - Springer
Abelian group actions appear in several areas of cryptography, especially isogeny-based
post-quantum cryptography. A natural problem is to relate the analogues of the …