Skip to main content

Secure Architectures of Future Emerging Cryptography

Deliverables

Lattice-based Cryptographic Key Management Architecture

This deliverable is a document that describes the architecture and high-level design of an effective key management approach for lattice-based cryptography, including high-level definition of any new protocols and infrastructure necessary to achieve an effective approach.

NIST Post-Quantum Competition Entry

NIST has declared a competition that will begin in November 2016 for standardization of public key encryption, signatures, and key exchange algorithms. As part of this work package, we will prepare an entry for all three of these primitives. The NIST contest will run for at least five years, past the ending of this project. During this work package, we will construct, implement, and submit our proposal as well as attend the conferences at which the proposals will be presented. We will also consider the various suggestions from the cryptographic community that will arise during the beginning of the evaluation phase.

Evaluation Report of Efficiency of Lattice-based Constructions

This deliverable is a document that will reflect requirements of lattice-based constructions with respect to their efficiency for hardware-based implementations.

Design Report Efficient Lattice-based IBE and ABE

This deliverable is a document that will detail the design of advanced lattice-based constructs for identity based encryption and attribute based encryption.

Case study Analysis and Validation

A report describing the results of our analysis of the SAFEcrypto solutions against the case study requirements.

Testbed Design Report

A report describing the network topology, data design and key equipment used to stage the use-case demonstrations.

Design Report Efficient Lattice-based Digital Signatures

This deliverable is a document that will detail the design of efficient lattice-based digital signature constructions.

Case study Specifications and Requirements

This document will specify the case studies and provide requirements for the technologies to be developed in SAFEcrypto.

First Interim Management Report

First interim management and progress report, describing the project management and technical activities, including results, problems incurred and the corrective actions taken. Also includes an approximate budget forecast.

Overview of related research projects

This deliverable will outline completed and current projects in similar or related technology areas at both national and European level

Risk and Vulnerability Assessment of Lattice-based Cryptographic Architectures

This deliverable is a document that will provide an in depth analysis of the risks and vulnerabilities for lattice-based cryptographic architectures for the given case studies.

Testing and Benchmarkng Results

This deliverable is a report detailing testing and performance results.

Design Report Efficient Lattice-based Authentication

This deliverable is a document that will detail the design of efficient lattice-based authentication constructions.

Lattice-based Software Requirements Specification

This deliverable is a document that will define a set of software requirements for both resource-constrained embedded platforms and high performance multi-core architectures.

Post Quantum Cryptographic Key Management Assessment

This deliverable is a document that assesses state-of-the-art in applicable architectures and technologies for key management that may be applicable to post quantum cryptography.

Physical attack-resistant methodologies for lattice-based constructions implemented in software

This is a report outlining application-appropriate physical attack-resistant methodologies for lattice-based constructions implemented in software. The report will include experimental and performance results.

Publication of Book

A book describing the state-of-the-art in lattice-based cryptography will be published by the end of the project.

State-of-the-Art in physical side channel attacks and resistant technologies

This deliverable is a document that outlines the state-of-the-art in side channel attacks and countermeasures and a set of guidelines on generic SCA countermeasures that may be applicable for lattice-based cryptographic implementations (both hardware and software).

Lattice-based Cryptographic Key Management Prototype

This deliverable is a prototype and key management solution of the proposed lattice-based key management design, to be used in WP9 as demonstration of this approach.

Automatic application of SCA countermeasures to lattice-based architectures

This deliverable is an extension of software compilers and hardware design tools to support the automatic application of the proposed countermeasures.

SAFEcrypto workshops

The project participants will organise two lattice-based cryptographic workshops 1.5 and 3.5 years after the project start date (M18 & M42).

Briefings, webinars and training materials

A small number of technology and business briefings to be delivered to a wide range of stakeholders.

On-line presence

The initial version of the project web site will be launched at the start of the project providing information on partners, plans, goals and activities. Social media presence, including Twitter and LinkedIn profiles, will be created.

Searching for OpenAIRE data...

Publications

The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs

Author(s): Rafaël Del Pino, Vadim Lyubashevsky, David Pointcheval
Published in: Security and Cryptography in Networks (SCN) 2016, Issue LNCS 9841, 2016, Page(s) 1-6

Standard lattices in hardware

Author(s): J. Howe, C. Moore, M. O'Neill, F. Regazzoni, T. Güneysu, K. Beeden
Published in: Proceedings of the 53rd Annual Design Automation Conference on - DAC '16, 2016, Page(s) 1-6
DOI: 10.1145/2897937.2898037

A Practical Implementation of Identity-Based Encryption Over NTRU Lattices

Author(s): Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
Published in: IMA International Conference on Cryptography and Coding. IMACC 2017, Issue Lecture Notes in Computer Science, vol 10655, 2017, Page(s) 227-246
DOI: 10.1007/978-3-319-71045-7_12

Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things

Author(s): Tim Guneysu, Tobias Oder
Published in: 2017 18th International Symposium on Quality Electronic Design (ISQED), Issue 2017, 2017, Page(s) 319-324
DOI: 10.1109/ISQED.2017.7918335

Time-independent discrete Gaussian sampling for post-quantum cryptography

Author(s): A. Khalid, J. Howe, C. Rafferty, M. O'Neill
Published in: 2016 International Conference on Field-Programmable Technology (FPT), 2016, Page(s) 241-244
DOI: 10.1109/FPT.2016.7929543

Compact and Provably Secure Lattice-Based Signatures in Hardware

Author(s): Howe, James; Khalid, Ayesha; Rafferty, Ciara; O'Neill, Maire
Published in: IEEE International Symposium of Circuits and Systems, Baltimore, United States. 28/05/2017 - 31/05/2017, Issue 2017, 2018

GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography

Author(s): Howe, J, O'Neill, M,
Published in: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain, 24-26 July 2017, Issue 2017, 2018

Lattice-based cryptography: From reconfigurable hardware to ASIC

Author(s): Tobias Oder, Tim Guneysu, Felipe Valencia, Ayesha Khalid, Maire O'Neill, Francesco Regazzoni
Published in: 2016 International Symposium on Integrated Circuits (ISIC), 2016, Page(s) 1-4
DOI: 10.1109/ISICIR.2016.7829689

Multi-input inner-product functional encryption from pairings

Author(s): Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
Published in: International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, Paris, France, 30 April - 4 May 2017, Issue LNCS vol 10210, 2017, Page(s) 601-626
DOI: 10.1007/978-3-319-56620-7_21

Simple Functional Encryption Schemes for Inner Products

Author(s): Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
Published in: IACR International Workshop on Public-Key Cryptography -- PKC 2015, Issue Lecture Notes in Computer Science, vol 9020., 2015, Page(s) 733-751
DOI: 10.1007/978-3-662-46447-2_33

Implementing the New-Hope Simple Key Exchange on Low-Cost FPGAs

Author(s): Tobias Oder, Tim Güneysu
Published in: International Conference on Cryptography and Information Security in Latin America (Latincrypt 2017). La Habana, Cuba. 20 - 22 September 2017, 2018

Secure architectures of future emerging cryptography SAFEcrypto

Author(s): Maire O'Neill, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, Elizabeth O'Sullivan, David Lund, Gavin McWilliams, Markku-Juhani Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafael del Pino, Michel Abdalla
Published in: Proceedings of the ACM International Conference on Computing Frontiers - CF '16, 2016, Page(s) 315-322
DOI: 10.1145/2903150.2907756

Error Samplers for Lattice-Based Cryptography - Challenges, Vulnerabilities and Solutions

Author(s): Khalid, A, Rafferty, C, Howe, J, Brannigan, S, Liu, W, O'Neill, M
Published in: IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2018: Proceedings, 2018

The design space of the number theoretic transform: A survey

Author(s): Felipe Valencia, Ayesha Khalid, Elizabeth O'Sullivan, Francesco Regazzoni
Published in: 2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS), 2017, Page(s) 273-277
DOI: 10.1109/samos.2017.8344640

Physical Protection of Lattice-Based Cryptography - Challenges and Solutions

Author(s): Ayesha Khalid, Tobias Oder, Felipe Valencia, Maire O' Neill, Tim Güneysu, Francesco Regazzoni
Published in: Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18, 2018, Page(s) 365-370
DOI: 10.1145/3194554.3194616

Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography

Author(s): Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O'Neill
Published in: 2018 IEEE International Symposium on Circuits and Systems (ISCAS), 2018, Page(s) 1-5
DOI: 10.1109/iscas.2018.8351009

Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography

Author(s): Fan, S, Liu, W, Howe, J, Khalid, A, O'Neill, M
Published in: IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2018: Proceedings, 2018

Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography

Author(s): Howe, J, Khalid, A, Regazonni, F, Oswald, E, Martinoli, M
Published in: International Symposium on Circuits and systems (ISCAS 19), 2019

Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings

Author(s): M. Abdalla, D. Catalano, D. Fiore, R. Gay, and B. Ursu
Published in: CRYPTO 2018. Proceedings of the 38th International Cryptology Conference, Santa Barbara, CA. 19-23 August, Issue 10991, 2018, Page(s) 579–627

Towards Practical Microcontroller Implementation of the Signature Scheme Falcon

Author(s): Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu
Published in: PQCrypto 2019: The Tenth International Conference on Post-Quantum Cryptography, Chongqing University, Chongqing, May 8-10, 2019, 2019

A Lattice-based AKE on ARM Cortex-M4

Author(s): Julian Speith, Tobias Oder, Tim Güneysu
Published in: BalkanCryptSec 2018, Iasi, Romania, September 20-21, 2018, 2018

Evaluation of Lattice-Based Signature Schemes in Embedded Systems

Author(s): Tim Güneysu, Markus Krausz, Tobias Oder, Julian Speith
Published in: 25th IEEE International Conference on Electronics Circuits and Systems, Bordeaux, France, 2018

Quantum era challenges for classical computers

Author(s): Francesco Regazzoni, Austin Fowler, Ilia Polian
Published in: Proceedings of the 18th International Conference on Embedded Computer Systems Architectures, Modeling, and Simulation - SAMOS '18, 2018, Page(s) 173-178
DOI: 10.1145/3229631.3264737

Exploring the Vulnerability of R-LWE Encryption to Fault Attacks

Author(s): Felipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni
Published in: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Page(s) 7-12
DOI: 10.1145/3178291.3178294

Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto

Author(s): Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
Published in: 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography, Issue April 14-17, 2019, Beijing, China, 2019

High-Performance and Lightweight Lattice-Based Public-Key Encryption

Author(s): Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
Published in: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS '16, 2016, Page(s) 2-9
DOI: 10.1145/2899007.2899011

On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography

Author(s): James Howe, Ayesha Khalid, Ciara Rafferty, Francesco Regazzoni, Maire O'Neill
Published in: IEEE Transactions on Computers, Issue 67/3, 2018, Page(s) 322-334, ISSN 0018-9340
DOI: 10.1109/TC.2016.2642962

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

Author(s): Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
Published in: ACM Transactions on Embedded Computing Systems, Issue 16/4, 2017, Page(s) 1-24, ISSN 1539-9087
DOI: 10.1145/3092951

CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme

Author(s): Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., & Stehlé, D.
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2018(1), 2018, Page(s) 238-268, ISSN 2569-2925

Practical CCA2-Secure and Masked Ring-LWE Implementation

Author(s): Oder, T., Schneider, T., Pöppelmann, T., & Güneysu, T.
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2018(1), 2018, Page(s) 142-174, ISSN 2569-2925

Post-quantum Lattice-based Cryptography Implementations: A Survey

Author(s): Hamid Nejatollahi, Nikil Dutt, Sandip Ray, Francesco Regazzoni, Indranil Banerjee, Rosario Cammarota
Published in: ACM Computing Surveys (CSUR), 2019, ISSN 0360-0300

Practical Lattice-Based Digital Signature Schemes

Author(s): James Howe, Thomas Pöppelmann, Máire O'neill, Elizabeth O'sullivan, Tim Güneysu
Published in: ACM Transactions on Embedded Computing Systems, Issue 14/3, 2015, Page(s) 1-24, ISSN 1539-9087
DOI: 10.1145/2724713

Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware

Author(s): Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
Published in: IEEE Transactions on Computers, Issue 64/7, 2015, Page(s) 1954-1967, ISSN 0018-9340
DOI: 10.1109/TC.2014.2346177

Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat Sampler

Author(s): Séamus Brannigan, Máire O’Neill, Ayesha Khalid, Ciara Rafferty
Published in: Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings, Issue 11348, 2018, Page(s) 65-84
DOI: 10.1007/978-3-030-05072-6_5

Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices

Author(s): Vadim Lyubashevsky, Thomas Prest
Published in: Advances in Cryptology -- EUROCRYPT 2015, Issue LNCS 9056, 2015, Page(s) 789-815
DOI: 10.1007/978-3-662-46800-5_30

High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers

Author(s): Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Published in: Progress in Cryptology -- LATINCRYPT 2015, Issue LNCS 9230, 2015, Page(s) 346-365
DOI: 10.1007/978-3-319-22174-8_19

Simple Lattice Trapdoor Sampling from a Broad Class of Distributions

Author(s): Vadim Lyubashevsky, Daniel Wichs
Published in: Public-Key Cryptography -- PKC 2015, Issue LNCS 9020, 2015, Page(s) 716-730
DOI: 10.1007/978-3-662-46447-2_32