[PDF][PDF] Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process

G Alagic, M Bros, P Ciadoux, D Cooper, Q Dang… - NIST IR, 2024 - nvlpubs.nist.gov
NIST is in the process of evaluating public-key digital signature algorithms for potential
standardization to protect sensitive information into the foreseeable future, including after the …

Ab-pake: Achieving fine-grained access control and flexible authentication

M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …

Carry your fault: a fault propagation attack on side-channel protected LWE-based KEM

S Kundu, S Chowdhury, S Saha, A Karmakar… - arxiv preprint arxiv …, 2024 - arxiv.org
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with
errors (LWE) problem, have been subjected to several physical attacks in the recent past …

Post-quantum signatures in DNSSEC via request-based fragmentation

J Goertzen, D Stebila - International Conference on Post-Quantum …, 2023 - Springer
Abstract The Domain Name System Security Extensions (DNSSEC) provide authentication
of DNS responses using digital signatures. DNS operates primarily over UDP, which leads …

A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer

P Mondal, S Kundu, S Bhattacharya… - … Conference on Applied …, 2024 - Springer
Physical attacks are serious threats to cryptosystems deployed in the real world. In this work,
we propose a microarchitectural end-to-end attack methodology on generic lattice-based …

Impeccable Keccak: Towards Fault Resilient SPHINCS+ Implementations

I Gavrilan, F Oberhansl, A Wagner… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
The standardization of the hash-based digital signature scheme SPHINCS+ proceeds faster
than initially expected. This development seems to be welcomed by practitioners who …

CryptAttackTester: high-assurance attack analysis

DJ Bernstein, T Chou - Annual International Cryptology Conference, 2024 - Springer
Quantitative analyses of the costs of cryptographic attack algorithms play a central role in
comparing cryptosystems, guiding the search for improved attacks, and deciding which …

Quantum-resistant MACsec and IPsec for virtual private networks

SL Gazdag, S Grundner-Culemann, T Heider… - … on Research in Security …, 2023 - Springer
Despite considerable progress in theoretical post-quantum cryptography we have yet to see
significant advances in its practical adoption. The necessary protocol modifications need to …

Scabbard: An exploratory study on hardware aware design choices of learning with rounding-based key encapsulation mechanisms

S Kundu, Q Norga, A Karmakar… - ACM Transactions on …, 2024 - dl.acm.org
Recently, the construction of cryptographic schemes based on hard lattice problems has
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …

Hardware acceleration of NTT-based polynomial multiplication in CRYSTALS-KYBER

H Yang, R Chen, Q Wang, Z Wu, W Peng - International Conference on …, 2023 - Springer
CRYSTALS-Kyber is a promising post-quantum encryption candidate and has been
selected for standardization. However, its operational efficiency faces challenges due to …