[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …
ongoing effort to build a quantum computer urges the cryptography community to develop …
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
The threat of a coming quantum computer motivates the research for new zero-knowledge
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …
LESS-FM: fine-tuning signatures from the code equivalence problem
Code-based cryptographic schemes are highly regarded among the quantum-safe
alternatives to current standards. Yet, designing code-based signatures using traditional …
alternatives to current standards. Yet, designing code-based signatures using traditional …
Syndrome decoding estimator
The selection of secure parameter sets requires an estimation of the attack cost to break the
respective cryptographic scheme instantiated under these parameters. The current NIST …
respective cryptographic scheme instantiated under these parameters. The current NIST …
McEliece needs a break–solving McEliece-1284 and quasi-cyclic-2918 with modern ISD
With the recent shift to post-quantum algorithms it becomes increasingly important to provide
precise bit-security estimates for code-based cryptography such as McEliece and quasi …
precise bit-security estimates for code-based cryptography such as McEliece and quasi …
The hardness of LPN over any integer ring and field for PCG applications
Learning parity with noise (LPN) has been widely studied and used in cryptography. It was
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
On the computational hardness of the code equivalence problem in cryptography
Code equivalence is a well-known concept in coding theory. Recently, literature saw an
increased interest in this notion, due to the introduction of protocols based on the hardness …
increased interest in this notion, due to the introduction of protocols based on the hardness …
: a Software Library for Cryptographic Hardness Estimation
The estimation of the computational complexity of hard problems is essential for determining
secure parameters for cryptographic systems. To date, those estimations are often …
secure parameters for cryptographic systems. To date, those estimations are often …
New time-memory trade-offs for subset sum–improving ISD in theory and practice
A Esser, F Zweydinger - Annual International Conference on the Theory …, 2023 - Springer
We propose new time-memory trade-offs for the random subset sum problem defined on (a
1,…, an, t) over Z 2 n. Our trade-offs yield significant running time improvements for every …
1,…, an, t) over Z 2 n. Our trade-offs yield significant running time improvements for every …