Post-quantum cryptography
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …
medical devices. However, many commonly used cryptosystems will be completely broken …
State-of-the-art survey of quantum cryptography
A Kumar, S Garhwal - Archives of Computational Methods in Engineering, 2021 - Springer
In today Internet era, confidential information transmitted over an insecure channel. With the
significant development in the area of quantum computing, there is a need for unconditional …
significant development in the area of quantum computing, there is a need for unconditional …
TFHE: fast fully homomorphic encryption over the torus
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
[PDF][PDF] Falcon: Fast-Fourier lattice-based compact signatures over NTRU
This document is the supporting documentation of Falcon. It is organized as follows. Chapter
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …
[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …
error for Kyber512 was rather conservative, while at the same time, there were requests to …
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable
A succinct non-interactive argument of knowledge (SNARK) allows a prover to produce a
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …
Pseudorandomness of ring-LWE for any ring and modulus
We give a polynomial-time quantum reduction from worst-case (ideal) lattice problems
directly to decision (Ring-) LWE. This extends to decision all the worst-case hardness results …
directly to decision (Ring-) LWE. This extends to decision all the worst-case hardness results …
Post-quantum key exchange for the internet and the open quantum safe project
D Stebila, M Mosca - International Conference on Selected Areas in …, 2016 - Springer
Designing public key cryptosystems that resist attacks by quantum computers is an important
area of current cryptographic research and standardization. To retain confidentiality of …
area of current cryptographic research and standardization. To retain confidentiality of …