Phoenix: hash-and-sign with aborts from lattice gadgets
Preimage sampling is a fundamental tool in lattice-based cryptography, and its performance
directly impacts that of the cryptographic mechanisms relying on it. In 2012, Micciancio and …
directly impacts that of the cryptographic mechanisms relying on it. In 2012, Micciancio and …
A not so discrete sampler: Power analysis attacks on hawk signature scheme
M Guerreau, M Rossi - Cryptology ePrint Archive, 2024 - eprint.iacr.org
HAWK is a lattice-based signature scheme candidate to the fourth call of the NIST's Post-
Quantum standardization campaign. Considered as a cousin of Falcon (one of the future …
Quantum standardization campaign. Considered as a cousin of Falcon (one of the future …
: Masking-Friendly Hash-and-Sign Lattice Signatures
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into
masking-friendly signatures secure in the t-probing model. Until now, efficiently masking …
masking-friendly signatures secure in the t-probing model. Until now, efficiently masking …
A highly hardware Efficient ML-KEM accelerator with optimised architectural layers
The Module-Lattice-Based Key encapsulation Mechanism (ML-KEM) scheme, which is
currently being standardised, is a quantum attack resistant KEM that is based on CRYSTALS …
currently being standardised, is a quantum attack resistant KEM that is based on CRYSTALS …
Area-Time Efficient Hardware Implementation for Binary Ring-LWE Based Post-Quantum Cryptography
SI Chu, SA Ke - IEEE Transactions on Emerging Topics in …, 2024 - ieeexplore.ieee.org
Post-quantum cryptography (PQC) has recently gained intensive attention as the existing
public-key cryptosystems are vulnerable to quantum attacks. The ring-learning-with-errors …
public-key cryptosystems are vulnerable to quantum attacks. The ring-learning-with-errors …
Design of advanced post-quantum signature schemes
C Jeudy - 2024 - hal.science
The transition to post-quantum cryptography has been an enormous effort for cryptographers
over the last decade. In the meantime, cryptography for the protection of privacy, aiming at …
over the last decade. In the meantime, cryptography for the protection of privacy, aiming at …
Side-channel security for post-quantum cryptography
M Krausz - 2024 - hss-opus.ub.ruhr-unibochum.de
Post-quantum cryptography addresses the threat to our established asymmetric
cryptography posed by quantum computers. Like conventional cryptography …
cryptography posed by quantum computers. Like conventional cryptography …
О МЕТОДАХ ПРОЕКТИРОВАНИЯ ПОСТКВАНТОВОГО КРИПТОГРАФИЧЕСКОГО АЛГОРИТМА ЭЛЕКТРОННОЙ ЦИФРОВОЙ ПОДПИСИ
Р Оспанов, Е Сейткулов, К Утебаев… - Вестник …, 2024 - vestnik.alt.edu.kz
Аннотация Данная работа посвящена методам проектирования постквантового
криптографического алгоритма электронной цифровой подписи. Существуют …
криптографического алгоритма электронной цифровой подписи. Существуют …