Breaking rainbow takes a weekend on a laptop

W Beullens - Annual International Cryptology Conference, 2022 - Springer
This work introduces new key recovery attacks against the Rainbow signature scheme,
which is one of the three finalist signature schemes still in the NIST Post-Quantum …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

A new perturbation for multivariate public key schemes such as HFE and UOV

JC Faugère, J Patarin, L Perret - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present here the analysis of a new perturbation, that seems to strengthen significantly
the security of some families of multivariate schemes. Thanks to this new perturbation, we …

2F-a new method for constructing efficient multivariate encryption schemes

D Smith-Tone - International Conference on Post-Quantum …, 2022 - Springer
Abstract The Support Minors method of solving the MinRank problem has contributed to
several new cryptanalyses of post-quantum cryptosystems including some of the most …

A subexponential quantum algorithm for the semidirect discrete logarithm problem

C Battarbee, D Kahrobaei, L Perret… - … Conference on Post …, 2024 - Springer
Group-based cryptography is a relatively unexplored family in post-quantum cryptography,
and the so-called Semidirect Discrete Logarithm Problem (SDLP) is one of its most central …

Full post-quantum datagram tls handshake in the internet of things

C McLoughlin, C Gritti, J Samandari - International Conference on Codes …, 2023 - Springer
Quantum computers are a threat to the current standards for secure communication. The
Datagram Transport Layer Security (DTLS) protocol is a common protocol used by Internet …

New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes

B Cogliati, PA Fouque, L Goubin… - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Hash-and-Sign with Retry is a popular technique to design efficient signature
schemes from code-based or multivariate assumptions. Contrary to Hash-and-Sign …

Refined f5 algorithms for ideals of minors of square matrices

S Gopalakrishnan, V Neiger… - Proceedings of the 2023 …, 2023 - dl.acm.org
We consider the problem of computing a grevlex Gröbner basis for the set Fr (M) of minors of
size r of an n× n matrix M of generic linear forms over a field of characteristic zero or large …

State of the Art of HFE Variants: Is It Possible to Repair HFE with Appropriate Modifiers?

B Cogliati, G Macariot-Rat, J Patarin… - … Conference on Post …, 2024 - Springer
Abstract (that stands for Hidden Field Equations) belongs to multivariate cryptography and
was designed by Jacques Patarin in 1996 as a public key trapdoor suitable for encryption or …

Improved Cryptanalysis of HFERP

M Cartor, R Cartor, H Furue, D Smith-Tone - … International Conference on …, 2024 - Springer
In this paper we introduce a new attack on the multivariate encryption scheme HFERP, a big
field scheme including an extra variable set, additional equations of the UOV or Rainbow …