Deliverables Documents, reports (18) Lattice-based Cryptographic Key Management Architecture This deliverable is a document that describes the architecture and high-level design of an effective key management approach for lattice-based cryptography, including high-level definition of any new protocols and infrastructure necessary to achieve an effective approach. NIST Post-Quantum Competition Entry NIST has declared a competition that will begin in November 2016 for standardization of public key encryption, signatures, and key exchange algorithms. As part of this work package, we will prepare an entry for all three of these primitives. The NIST contest will run for at least five years, past the ending of this project. During this work package, we will construct, implement, and submit our proposal as well as attend the conferences at which the proposals will be presented. We will also consider the various suggestions from the cryptographic community that will arise during the beginning of the evaluation phase. Evaluation Report of Efficiency of Lattice-based Constructions This deliverable is a document that will reflect requirements of lattice-based constructions with respect to their efficiency for hardware-based implementations. Design Report Efficient Lattice-based IBE and ABE This deliverable is a document that will detail the design of advanced lattice-based constructs for identity based encryption and attribute based encryption. Case study Analysis and Validation A report describing the results of our analysis of the SAFEcrypto solutions against the case study requirements. Testbed Design Report A report describing the network topology, data design and key equipment used to stage the use-case demonstrations. Design Report Efficient Lattice-based Digital Signatures This deliverable is a document that will detail the design of efficient lattice-based digital signature constructions. Case study Specifications and Requirements This document will specify the case studies and provide requirements for the technologies to be developed in SAFEcrypto. First Interim Management Report First interim management and progress report, describing the project management and technical activities, including results, problems incurred and the corrective actions taken. Also includes an approximate budget forecast. Overview of related research projects This deliverable will outline completed and current projects in similar or related technology areas at both national and European level Risk and Vulnerability Assessment of Lattice-based Cryptographic Architectures This deliverable is a document that will provide an in depth analysis of the risks and vulnerabilities for lattice-based cryptographic architectures for the given case studies. Testing and Benchmarkng Results This deliverable is a report detailing testing and performance results. Design Report Efficient Lattice-based Authentication This deliverable is a document that will detail the design of efficient lattice-based authentication constructions. Lattice-based Software Requirements Specification This deliverable is a document that will define a set of software requirements for both resource-constrained embedded platforms and high performance multi-core architectures. Post Quantum Cryptographic Key Management Assessment This deliverable is a document that assesses state-of-the-art in applicable architectures and technologies for key management that may be applicable to post quantum cryptography. Physical attack-resistant methodologies for lattice-based constructions implemented in software This is a report outlining application-appropriate physical attack-resistant methodologies for lattice-based constructions implemented in software. The report will include experimental and performance results. Publication of Book A book describing the state-of-the-art in lattice-based cryptography will be published by the end of the project. State-of-the-Art in physical side channel attacks and resistant technologies This deliverable is a document that outlines the state-of-the-art in side channel attacks and countermeasures and a set of guidelines on generic SCA countermeasures that may be applicable for lattice-based cryptographic implementations (both hardware and software). Demonstrators, pilots, prototypes (1) Lattice-based Cryptographic Key Management Prototype This deliverable is a prototype and key management solution of the proposed lattice-based key management design, to be used in WP9 as demonstration of this approach. Other (2) Automatic application of SCA countermeasures to lattice-based architectures This deliverable is an extension of software compilers and hardware design tools to support the automatic application of the proposed countermeasures. SAFEcrypto workshops The project participants will organise two lattice-based cryptographic workshops 1.5 and 3.5 years after the project start date (M18 & M42). Websites, patent fillings, videos etc. (2) Briefings, webinars and training materials A small number of technology and business briefings to be delivered to a wide range of stakeholders. On-line presence The initial version of the project web site will be launched at the start of the project providing information on partners, plans, goals and activities. Social media presence, including Twitter and LinkedIn profiles, will be created. Publications Conference proceedings (26) The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs Author(s): Rafaël Del Pino, Vadim Lyubashevsky, David Pointcheval Published in: Security and Cryptography in Networks (SCN) 2016, Issue LNCS 9841, 2016, Page(s) 1-6, ISBN 978-3-319-44617-2 Publisher: Springer, Lecture notes in computer science Standard lattices in hardware Author(s): J. Howe, C. Moore, M. O'Neill, F. Regazzoni, T. Güneysu, K. Beeden Published in: Proceedings of the 53rd Annual Design Automation Conference on - DAC '16, 2016, Page(s) 1-6, ISBN 9781-450342360 Publisher: ACM Press DOI: 10.1145/2897937.2898037 A Practical Implementation of Identity-Based Encryption Over NTRU Lattices Author(s): Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan Published in: IMA International Conference on Cryptography and Coding. IMACC 2017, Issue Lecture Notes in Computer Science, vol 10655, 2017, Page(s) 227-246, ISBN 978-3-319-71045-7 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-71045-7_12 Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things Author(s): Tim Guneysu, Tobias Oder Published in: 2017 18th International Symposium on Quality Electronic Design (ISQED), Issue 2017, 2017, Page(s) 319-324, ISBN 978-1-5090-5404-6 Publisher: IEEE DOI: 10.1109/ISQED.2017.7918335 Time-independent discrete Gaussian sampling for post-quantum cryptography Author(s): A. Khalid, J. Howe, C. Rafferty, M. O'Neill Published in: 2016 International Conference on Field-Programmable Technology (FPT), 2016, Page(s) 241-244, ISBN 978-1-5090-5602-6 Publisher: IEEE DOI: 10.1109/FPT.2016.7929543 Compact and Provably Secure Lattice-Based Signatures in Hardware Author(s): Howe, James; Khalid, Ayesha; Rafferty, Ciara; O'Neill, Maire Published in: IEEE International Symposium of Circuits and Systems, Baltimore, United States. 28/05/2017 - 31/05/2017, Issue 2017, 2018 Publisher: IEEE GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography Author(s): Howe, J, O'Neill, M, Published in: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain, 24-26 July 2017, Issue 2017, 2018 Publisher: Springer Lattice-based cryptography: From reconfigurable hardware to ASIC Author(s): Tobias Oder, Tim Guneysu, Felipe Valencia, Ayesha Khalid, Maire O'Neill, Francesco Regazzoni Published in: 2016 International Symposium on Integrated Circuits (ISIC), 2016, Page(s) 1-4, ISBN 978-1-4673-9019-4 Publisher: IEEE DOI: 10.1109/ISICIR.2016.7829689 Multi-input inner-product functional encryption from pairings Author(s): Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee Published in: International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, Paris, France, 30 April - 4 May 2017, Issue LNCS vol 10210, 2017, Page(s) 601-626 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-56620-7_21 Simple Functional Encryption Schemes for Inner Products Author(s): Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval Published in: IACR International Workshop on Public-Key Cryptography -- PKC 2015, Issue Lecture Notes in Computer Science, vol 9020., 2015, Page(s) 733-751, ISBN 978-3-662-46447-2 Publisher: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-46447-2_33 Implementing the New-Hope Simple Key Exchange on Low-Cost FPGAs Author(s): Tobias Oder, Tim Güneysu Published in: International Conference on Cryptography and Information Security in Latin America (Latincrypt 2017). La Habana, Cuba. 20 - 22 September 2017, 2018 Publisher: Latincrypt Secure architectures of future emerging cryptography SAFEcrypto Author(s): Maire O'Neill, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, Elizabeth O'Sullivan, David Lund, Gavin McWilliams, Markku-Juhani Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafael del Pino, Michel Abdalla Published in: Proceedings of the ACM International Conference on Computing Frontiers - CF '16, 2016, Page(s) 315-322, ISBN 9781-450341288 Publisher: ACM Press DOI: 10.1145/2903150.2907756 Error Samplers for Lattice-Based Cryptography - Challenges, Vulnerabilities and Solutions Author(s): Khalid, A, Rafferty, C, Howe, J, Brannigan, S, Liu, W, O'Neill, M Published in: IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2018: Proceedings, 2018 Publisher: IEEE The design space of the number theoretic transform: A survey Author(s): Felipe Valencia, Ayesha Khalid, Elizabeth O'Sullivan, Francesco Regazzoni Published in: 2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS), 2017, Page(s) 273-277, ISBN 978-1-5386-3437-0 Publisher: IEEE DOI: 10.1109/samos.2017.8344640 Physical Protection of Lattice-Based Cryptography - Challenges and Solutions Author(s): Ayesha Khalid, Tobias Oder, Felipe Valencia, Maire O' Neill, Tim Güneysu, Francesco Regazzoni Published in: Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18, 2018, Page(s) 365-370, ISBN 9781-450357241 Publisher: ACM Press DOI: 10.1145/3194554.3194616 Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography Author(s): Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O'Neill Published in: 2018 IEEE International Symposium on Circuits and Systems (ISCAS), 2018, Page(s) 1-5, ISBN 978-1-5386-4881-0 Publisher: IEEE DOI: 10.1109/iscas.2018.8351009 Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography Author(s): Fan, S, Liu, W, Howe, J, Khalid, A, O'Neill, M Published in: IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2018: Proceedings, 2018 Publisher: IEEE Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography Author(s): Howe, J, Khalid, A, Regazonni, F, Oswald, E, Martinoli, M Published in: International Symposium on Circuits and systems (ISCAS 19), 2019 Publisher: IEEE Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings Author(s): M. Abdalla, D. Catalano, D. Fiore, R. Gay, and B. Ursu Published in: CRYPTO 2018. Proceedings of the 38th International Cryptology Conference, Santa Barbara, CA. 19-23 August, Issue 10991, 2018, Page(s) 579–627 Publisher: LNCS Towards Practical Microcontroller Implementation of the Signature Scheme Falcon Author(s): Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu Published in: PQCrypto 2019: The Tenth International Conference on Post-Quantum Cryptography, Chongqing University, Chongqing, May 8-10, 2019, 2019 Publisher: Springer A Lattice-based AKE on ARM Cortex-M4 Author(s): Julian Speith, Tobias Oder, Tim Güneysu Published in: BalkanCryptSec 2018, Iasi, Romania, September 20-21, 2018, 2018 Publisher: Springer Evaluation of Lattice-Based Signature Schemes in Embedded Systems Author(s): Tim Güneysu, Markus Krausz, Tobias Oder, Julian Speith Published in: 25th IEEE International Conference on Electronics Circuits and Systems, Bordeaux, France, 2018 Publisher: IEEE Quantum era challenges for classical computers Author(s): Francesco Regazzoni, Austin Fowler, Ilia Polian Published in: Proceedings of the 18th International Conference on Embedded Computer Systems Architectures, Modeling, and Simulation - SAMOS '18, 2018, Page(s) 173-178, ISBN 9781-450364942 Publisher: ACM Press DOI: 10.1145/3229631.3264737 Exploring the Vulnerability of R-LWE Encryption to Fault Attacks Author(s): Felipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni Published in: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Page(s) 7-12, ISBN 9781-450363747 Publisher: ACM Press DOI: 10.1145/3178291.3178294 Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto Author(s): Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu Published in: 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography, Issue April 14-17, 2019, Beijing, China, 2019 Publisher: Springer, LNCS High-Performance and Lightweight Lattice-Based Public-Key Encryption Author(s): Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann Published in: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS '16, 2016, Page(s) 2-9, ISBN 9781-450342834 Publisher: ACM Press DOI: 10.1145/2899007.2899011 Peer reviewed articles (7) On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography Author(s): James Howe, Ayesha Khalid, Ciara Rafferty, Francesco Regazzoni, Maire O'Neill Published in: IEEE Transactions on Computers, Issue 67/3, 2018, Page(s) 322-334, ISSN 0018-9340 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/TC.2016.2642962 High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers Author(s): Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede Published in: ACM Transactions on Embedded Computing Systems, Issue 16/4, 2017, Page(s) 1-24, ISSN 1539-9087 Publisher: Association for Computing Machinary, Inc. DOI: 10.1145/3092951 CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme Author(s): Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., & Stehlé, D. Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2018(1), 2018, Page(s) 238-268, ISSN 2569-2925 Publisher: RUB Practical CCA2-Secure and Masked Ring-LWE Implementation Author(s): Oder, T., Schneider, T., Pöppelmann, T., & Güneysu, T. Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2018(1), 2018, Page(s) 142-174, ISSN 2569-2925 Publisher: RUB Post-quantum Lattice-based Cryptography Implementations: A Survey Author(s): Hamid Nejatollahi, Nikil Dutt, Sandip Ray, Francesco Regazzoni, Indranil Banerjee, Rosario Cammarota Published in: ACM Computing Surveys (CSUR), 2019, ISSN 0360-0300 Publisher: Association for Computing Machinary, Inc. Practical Lattice-Based Digital Signature Schemes Author(s): James Howe, Thomas Pöppelmann, Máire O'neill, Elizabeth O'sullivan, Tim Güneysu Published in: ACM Transactions on Embedded Computing Systems, Issue 14/3, 2015, Page(s) 1-24, ISSN 1539-9087 Publisher: Association for Computing Machinary, Inc. DOI: 10.1145/2724713 Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware Author(s): Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann Published in: IEEE Transactions on Computers, Issue 64/7, 2015, Page(s) 1954-1967, ISSN 0018-9340 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/TC.2014.2346177 Book chapters (4) Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat Sampler Author(s): Séamus Brannigan, Máire O’Neill, Ayesha Khalid, Ciara Rafferty Published in: Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings, Issue 11348, 2018, Page(s) 65-84, ISBN 978-3-030-05071-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-05072-6_5 Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices Author(s): Vadim Lyubashevsky, Thomas Prest Published in: Advances in Cryptology -- EUROCRYPT 2015, Issue LNCS 9056, 2015, Page(s) 789-815, ISBN 978-3-662-46800-5 Publisher: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-46800-5_30 High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers Author(s): Thomas Pöppelmann, Tobias Oder, Tim Güneysu Published in: Progress in Cryptology -- LATINCRYPT 2015, Issue LNCS 9230, 2015, Page(s) 346-365, ISBN 978-3-319-22174-8 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-22174-8_19 Simple Lattice Trapdoor Sampling from a Broad Class of Distributions Author(s): Vadim Lyubashevsky, Daniel Wichs Published in: Public-Key Cryptography -- PKC 2015, Issue LNCS 9020, 2015, Page(s) 716-730, ISBN 978-3-662-46446-5 Publisher: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-46447-2_32 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available