Generic models for group actions
Abstract We define the Generic Group Action Model (GGAM), an adaptation of the Generic
Group Model to the setting of group actions (such as CSIDH). Compared to a previously …
Group Model to the setting of group actions (such as CSIDH). Compared to a previously …
[PDF][PDF] Swoosh: Practical Lattice-Based Non-Interactive Key Exchange.
The advent of quantum computers has sparked significant interest in post-quantum
cryptographic schemes, as a replacement for currently used cryptographic primitives. In this …
cryptographic schemes, as a replacement for currently used cryptographic primitives. In this …
{SWOOSH}: Efficient {Lattice-Based}{Non-Interactive} Key Exchange
The advent of quantum computers has sparked significant interest in post-quantum
cryptographic schemes, as a replacement for currently used cryptographic primitives. In this …
cryptographic schemes, as a replacement for currently used cryptographic primitives. In this …
Tighter qcca-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model
J Ge, T Shan, R Xue - Annual International Cryptology Conference, 2023 - Springer
Abstract Hofheinz et al.(TCC 2017) proposed several key encapsulation mechanism (KEM)
variants of Fujisaki-Okamoto (FO) transformation, including and QFO m⊥, and they are …
variants of Fujisaki-Okamoto (FO) transformation, including and QFO m⊥, and they are …
The pre-shared key modes of HPKE
Abstract The Hybrid Public Key Encryption (HPKE) standard was recently published as RFC
9180 by the Crypto Forum Research Group (CFRG) of the Internet Research Task Force …
9180 by the Crypto Forum Research Group (CFRG) of the Internet Research Task Force …
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith
J Meers, J Nowakowski - International Conference on the Theory and …, 2023 - Springer
We define and analyze the Commutative Isogeny Hidden Number Problem which is the
natural analogue of the Hidden Number Problem in the CSIDH and CSURF setting. In short …
natural analogue of the Hidden Number Problem in the CSIDH and CSURF setting. In short …
[BOOK][B] Public-Key Cryptography–PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10 …
A Boldyreva, V Kolesnikov - 2023 - books.google.com
The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed
proceedings of the 26th IACR International Conference on Practice and Theory of Public …
proceedings of the 26th IACR International Conference on Practice and Theory of Public …
Measure-rewind-extract: Tighter proofs of one-way to hiding and CCA security in the quantum random oracle model
J Ge, H Liao, R Xue - International Conference on the Theory and …, 2025 - Springer
Abstract The One-Way to Hiding (O2H) theorem, first given by Unruh (J ACM 2015) and then
restated by Ambainis et al.(CRYPTO 2019), is a crucial technique for solving the …
restated by Ambainis et al.(CRYPTO 2019), is a crucial technique for solving the …
Robustly Reusable Fuzzy Extractor from Isogeny
Abstract Robustly reusable Fuzzy Extractor (rrFE) allows multiple extractions from the same
fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …
fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions
Abelian group actions appear in several areas of cryptography, especially isogeny-based
post-quantum cryptography. A natural problem is to relate the analogues of the …
post-quantum cryptography. A natural problem is to relate the analogues of the …