Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable
A succinct non-interactive argument of knowledge (SNARK) allows a prover to produce a
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …
Masking kyber: First-and higher-order implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …
been extended to include the side-channel resistance of the candidates. While some …
A RISC-V post quantum cryptography instruction set extension for number theoretic transform to speed-up CRYSTALS algorithms
In recent years, public-key cryptography has become a fundamental component of digital
infrastructures. Such a scenario has to face a new and increasing threat, represented by …
infrastructures. Such a scenario has to face a new and increasing threat, represented by …
NTRU fatigue: how stretched is overstretched?
Until recently lattice reduction attacks on NTRU lattices were thought to behave similar as on
(ring-) LWE lattices with the same parameters. However several works (Albrecht-Bai-Ducas …
(ring-) LWE lattices with the same parameters. However several works (Albrecht-Bai-Ducas …
Chosen ciphertext k-trace attacks on masked cca2 secure kyber
Single-trace attacks are a considerable threat to implementations of classic public-key
schemes, and their implications on newer lattice-based schemes are still not well …
schemes, and their implications on newer lattice-based schemes are still not well …
A comprehensive survey on post-quantum tls
Transport Layer Security (TLS) is the backbone security protocol of the Internet. As this
fundamental protocol is at risk from future quantum attackers, many proposals have been …
fundamental protocol is at risk from future quantum attackers, many proposals have been …
Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
We investigate all NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …
Lattice‐based cryptosystems in standardisation processes: A survey
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To
prepare for cybersecurity in the quantum era, some projects have been launched to call for …
prepare for cybersecurity in the quantum era, some projects have been launched to call for …
Lattice sieving via quantum random walks
A Chailloux, J Loyer - Advances in Cryptology–ASIACRYPT 2021: 27th …, 2021 - Springer
Lattice-based cryptography is one of the leading proposals for post-quantum cryptography.
The Shortest Vector Problem (SVP) is arguably the most important problem for the …
The Shortest Vector Problem (SVP) is arguably the most important problem for the …
Ring signatures for deniable AKEM: Gandalf's fellowship
Ring signatures, a cryptographic primitive introduced by Rivest, Shamir and Tauman
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …