[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs

T Feneuil, A Joux, M Rivain - Annual International Cryptology Conference, 2022 - Springer
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …

Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature

T Feneuil, A Joux, M Rivain - Designs, Codes and Cryptography, 2023 - Springer
The threat of a coming quantum computer motivates the research for new zero-knowledge
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …

LESS-FM: fine-tuning signatures from the code equivalence problem

A Barenghi, JF Biasse, E Persichetti… - … Workshop, PQCrypto 2021 …, 2021 - Springer
Code-based cryptographic schemes are highly regarded among the quantum-safe
alternatives to current standards. Yet, designing code-based signatures using traditional …

Syndrome decoding estimator

A Esser, E Bellini - IACR International Conference on Public-Key …, 2022 - Springer
The selection of secure parameter sets requires an estimation of the attack cost to break the
respective cryptographic scheme instantiated under these parameters. The current NIST …

McEliece needs a break–solving McEliece-1284 and quasi-cyclic-2918 with modern ISD

A Esser, A May, F Zweydinger - … on the Theory and Applications of …, 2022 - Springer
With the recent shift to post-quantum algorithms it becomes increasingly important to provide
precise bit-security estimates for code-based cryptography such as McEliece and quasi …

The hardness of LPN over any integer ring and field for PCG applications

H Liu, X Wang, K Yang, Y Yu - … International Conference on the Theory and …, 2024 - Springer
Learning parity with noise (LPN) has been widely studied and used in cryptography. It was
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …

On the computational hardness of the code equivalence problem in cryptography

A Barenghi, JF Biasse, E Persichetti… - Cryptology ePrint …, 2022 - eprint.iacr.org
Code equivalence is a well-known concept in coding theory. Recently, literature saw an
increased interest in this notion, due to the introduction of protocols based on the hardness …

: a Software Library for Cryptographic Hardness Estimation

A Esser, J Verbel, F Zweydinger, E Bellini - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The estimation of the computational complexity of hard problems is essential for determining
secure parameters for cryptographic systems. To date, those estimations are often …

New time-memory trade-offs for subset sum–improving ISD in theory and practice

A Esser, F Zweydinger - Annual International Conference on the Theory …, 2023 - Springer
We propose new time-memory trade-offs for the random subset sum problem defined on (a
1,…, an, t) over Z 2 n. Our trade-offs yield significant running time improvements for every …