Phoenix: hash-and-sign with aborts from lattice gadgets

C Jeudy, A Roux-Langlois, O Sanders - International Conference on Post …, 2024 - Springer
Preimage sampling is a fundamental tool in lattice-based cryptography, and its performance
directly impacts that of the cryptographic mechanisms relying on it. In 2012, Micciancio and …

A not so discrete sampler: Power analysis attacks on hawk signature scheme

M Guerreau, M Rossi - Cryptology ePrint Archive, 2024 - eprint.iacr.org
HAWK is a lattice-based signature scheme candidate to the fourth call of the NIST's Post-
Quantum standardization campaign. Considered as a cousin of Falcon (one of the future …

: Masking-Friendly Hash-and-Sign Lattice Signatures

MF Esgin, T Espitau, G Niot, T Prest, A Sakzad… - … Conference on the …, 2024 - Springer
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into
masking-friendly signatures secure in the t-probing model. Until now, efficiently masking …

A highly hardware Efficient ML-KEM accelerator with optimised architectural layers

Z Ni, A Khalid, W Liu, M O'Neill - ACM Transactions on Embedded …, 2025 - dl.acm.org
The Module-Lattice-Based Key encapsulation Mechanism (ML-KEM) scheme, which is
currently being standardised, is a quantum attack resistant KEM that is based on CRYSTALS …

Area-Time Efficient Hardware Implementation for Binary Ring-LWE Based Post-Quantum Cryptography

SI Chu, SA Ke - IEEE Transactions on Emerging Topics in …, 2024 - ieeexplore.ieee.org
Post-quantum cryptography (PQC) has recently gained intensive attention as the existing
public-key cryptosystems are vulnerable to quantum attacks. The ring-learning-with-errors …

Design of advanced post-quantum signature schemes

C Jeudy - 2024 - hal.science
The transition to post-quantum cryptography has been an enormous effort for cryptographers
over the last decade. In the meantime, cryptography for the protection of privacy, aiming at …

Side-channel security for post-quantum cryptography

M Krausz - 2024 - hss-opus.ub.ruhr-unibochum.de
Post-quantum cryptography addresses the threat to our established asymmetric
cryptography posed by quantum computers. Like conventional cryptography …

О МЕТОДАХ ПРОЕКТИРОВАНИЯ ПОСТКВАНТОВОГО КРИПТОГРАФИЧЕСКОГО АЛГОРИТМА ЭЛЕКТРОННОЙ ЦИФРОВОЙ ПОДПИСИ

Р Оспанов, Е Сейткулов, К Утебаев… - Вестник …, 2024 - vestnik.alt.edu.kz
Аннотация Данная работа посвящена методам проектирования постквантового
криптографического алгоритма электронной цифровой подписи. Существуют …