Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable

MR Albrecht, V Cini, RWF Lai, G Malavolta… - Annual International …, 2022 - Springer
A succinct non-interactive argument of knowledge (SNARK) allows a prover to produce a
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …

Masking kyber: First-and higher-order implementations

JW Bos, M Gourjon, J Renes, T Schneider… - IACR Transactions on …, 2021 - incs.ub.rub.de
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …

A RISC-V post quantum cryptography instruction set extension for number theoretic transform to speed-up CRYSTALS algorithms

P Nannipieri, S Di Matteo, L Zulberti, F Albicocchi… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, public-key cryptography has become a fundamental component of digital
infrastructures. Such a scenario has to face a new and increasing threat, represented by …

NTRU fatigue: how stretched is overstretched?

L Ducas, W van Woerden - … 2021: 27th International Conference on the …, 2021 - Springer
Until recently lattice reduction attacks on NTRU lattices were thought to behave similar as on
(ring-) LWE lattices with the same parameters. However several works (Albrecht-Bai-Ducas …

Chosen ciphertext k-trace attacks on masked cca2 secure kyber

M Hamburg, J Hermelink, R Primas… - IACR Transactions on …, 2021 - ojs.ub.rub.de
Single-trace attacks are a considerable threat to implementations of classic public-key
schemes, and their implications on newer lattice-based schemes are still not well …

A comprehensive survey on post-quantum tls

N Alnahawi, J Müller, J Oupický… - IACR Communications …, 2024 - inria.hal.science
Transport Layer Security (TLS) is the backbone security protocol of the Internet. As this
fundamental protocol is at risk from future quantum attackers, many proposals have been …

Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates

K Xagawa, A Ito, R Ueno, J Takahashi… - Advances in Cryptology …, 2021 - Springer
We investigate all NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …

Lattice‐based cryptosystems in standardisation processes: A survey

A Wang, D **ao, Y Yu - IET Information Security, 2023 - Wiley Online Library
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To
prepare for cybersecurity in the quantum era, some projects have been launched to call for …

Lattice sieving via quantum random walks

A Chailloux, J Loyer - Advances in Cryptology–ASIACRYPT 2021: 27th …, 2021 - Springer
Lattice-based cryptography is one of the leading proposals for post-quantum cryptography.
The Shortest Vector Problem (SVP) is arguably the most important problem for the …

Ring signatures for deniable AKEM: Gandalf's fellowship

P Gajland, J Janneck, E Kiltz - Annual International Cryptology Conference, 2024 - Springer
Ring signatures, a cryptographic primitive introduced by Rivest, Shamir and Tauman
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …