Lattice‐based cryptosystems in standardisation processes: A survey

A Wang, D **ao, Y Yu - IET Information Security, 2023 - Wiley Online Library
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To
prepare for cybersecurity in the quantum era, some projects have been launched to call for …

Ring signatures for deniable AKEM: Gandalf's fellowship

P Gajland, J Janneck, E Kiltz - Annual International Cryptology Conference, 2024 - Springer
Ring signatures, a cryptographic primitive introduced by Rivest, Shamir and Tauman
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …

NTRU+: Compact construction of NTRU using simple encoding method

J Kim, JH Park - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
NTRU was the first practical public key encryption scheme constructed on a lattice over a
polynomial-based ring and has been considered secure against significant cryptanalytic …

Generic models for group actions

J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on Public …, 2023 - Springer
Abstract We define the Generic Group Action Model (GGAM), an adaptation of the Generic
Group Model to the setting of group actions (such as CSIDH). Compared to a previously …

BAT: Small and fast KEM over NTRU lattices

PA Fouque, P Kirchner… - IACR Transactions on …, 2022 - philosophymindscience.org
We present BAT–an IND-CCA secure key encapsulation mechanism (KEM) that is based on
NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs. It …

Group action key encapsulation and non-interactive key exchange in the QROM

J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on the …, 2022 - Springer
In the context of quantum-resistant cryptography, cryptographic group actions offer an
abstraction of isogeny-based cryptography in the Commutative Supersingular Isogeny Diffie …

NEV: faster and smaller NTRU encryption using vector decoding

J Zhang, D Feng, D Yan - International Conference on the Theory and …, 2023 - Springer
In this paper, we present NEV–a faster and smaller NTRU Encryption using Vector
decoding, which is provably IND-CPA secure in the standard model under the decisional …

POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption

C Hoffmann, B Libert, C Momin, T Peters… - … Conference on Public …, 2023 - Springer
As for any cryptographic algorithm, the deployment of post-quantum CCA-secure public key
encryption schemes may come with the need to be protected against side-channel attacks …

Double-sided: Tight proofs for guessing games in the quantum random oracle model

J Bao, J Ge, R Xue - Cybersecurity, 2024 - Springer
The semi-classical One-Way to Hiding (SC-O2H) lemma given by Ambainis et al.(CRYPTO
2019) is a crucial technique to solve the reprogramming problem in the quantum random …

Compact Encryption based on Module-NTRU problems

S Bai, H Jangir, H Lin, T Ngo, W Wen… - … Conference on Post …, 2024 - Springer
The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468),
and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS'20), generalizes the …