Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
Post-quantum cryptography
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …
medical devices. However, many commonly used cryptosystems will be completely broken …
Crystals-dilithium: A lattice-based digital signature scheme
In this paper, we present the lattice-based signature scheme Dilithium, which is a
component of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) suite that was …
component of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) suite that was …
[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …
error for Kyber512 was rather conservative, while at the same time, there were requests to …
Masking kyber: First-and higher-order implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …
been extended to include the side-channel resistance of the candidates. While some …
Lord of the ring (s): Side channel attacks on the {CPU}{On-Chip} ring interconnect are practical
We introduce the first microarchitectural side channel attacks that leverage contention on the
CPU ring interconnect. There are two challenges that make it uniquely difficult to exploit this …
CPU ring interconnect. There are two challenges that make it uniquely difficult to exploit this …
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …
applications and systems. One popular type of such attacks is the microarchitectural attack …
LWE with side information: attacks and concrete security estimation
We propose a framework for cryptanalysis of lattice-based schemes, when side information—
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …
A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
Abstract The Fiat-Shamir transform is a technique for combining a hash function and an
identification scheme to produce a digital signature scheme. The resulting scheme is known …
identification scheme to produce a digital signature scheme. The resulting scheme is known …
Prime+ Scope: Overcoming the observer effect for high-precision cache contention attacks
Modern processors expose software to information leakage through shared
microarchitectural state. One of the most severe leakage channels is cache contention …
microarchitectural state. One of the most severe leakage channels is cache contention …