Proofs, arguments, and zero-knowledge
J Thaler - Foundations and Trends® in Privacy and Security, 2022 - nowpublishers.com
Interactive proofs (IPs) and arguments are cryptographic protocols that enable an untrusted
prover to provide a guarantee that it performed a requested computation correctly …
prover to provide a guarantee that it performed a requested computation correctly …
High-performance hardware implementation of crystals-dilithium
Many currently deployed public-key cryptosystems are based on the difficulty of the discrete
logarithm and integer factorization problems. However, given an adequately sized quantum …
logarithm and integer factorization problems. However, given an adequately sized quantum …
Banquet: short and fast signatures from AES
This work introduces Banquet, a digital signature scheme with post-quantum security,
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
FPGA-based SPHINCS+ Implementations: Mind the Glitch
The digital signature scheme SPHINCS+ is a candidate in the NIST post-quantum project,
whose aim is to standardize cryptographic systems that are secure against attacks …
whose aim is to standardize cryptographic systems that are secure against attacks …
Hls-based hw/sw co-design of the post-quantum classic mceliece cryptosystem
V Kostalabros, J Ribes-González… - … Conference on Field …, 2021 - ieeexplore.ieee.org
While quantum computers are rapidly becoming more powerful, the current cryptographic
infrastructure is imminently threatened. In a preventive manner, the US National Institute of …
infrastructure is imminently threatened. In a preventive manner, the US National Institute of …
High-performance hardware implementation of lattice-based digital signatures
Many currently deployed public-key cryptosystems are based on the difficulty of the discrete
logarithm and integer factorization problems. However, given an adequately sized quantum …
logarithm and integer factorization problems. However, given an adequately sized quantum …
[PDF][PDF] Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7.
This paper presents benchmarking and profiling of the two lattice-based signature scheme
finalists, Dilithium and Falcon, on the ARM Cortex M7 using the STM32F767ZI NUCLEO-144 …
finalists, Dilithium and Falcon, on the ARM Cortex M7 using the STM32F767ZI NUCLEO-144 …
Lightweight implementation of the lowmc block cipher protected against side-channel attacks
LowMC is a parameterizable block cipher developed for use in Multi-Party Computation
(MPC) and Fully Homomorphic Encryption (FHE). In these applications, linear operations …
(MPC) and Fully Homomorphic Encryption (FHE). In these applications, linear operations …
Exploring parallelism to improve the performance of frodokem in hardware
FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in
NIST's post-quantum standardisation effort. A condition for these candidates is to use NIST …
NIST's post-quantum standardisation effort. A condition for these candidates is to use NIST …