CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.
I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .
Risultati finali
This deliverable is a document that describes the architecture and high-level design of an effective key management approach for lattice-based cryptography, including high-level definition of any new protocols and infrastructure necessary to achieve an effective approach.
NIST Post-Quantum Competition EntryNIST has declared a competition that will begin in November 2016 for standardization of public key encryption, signatures, and key exchange algorithms. As part of this work package, we will prepare an entry for all three of these primitives. The NIST contest will run for at least five years, past the ending of this project. During this work package, we will construct, implement, and submit our proposal as well as attend the conferences at which the proposals will be presented. We will also consider the various suggestions from the cryptographic community that will arise during the beginning of the evaluation phase.
Evaluation Report of Efficiency of Lattice-based ConstructionsThis deliverable is a document that will reflect requirements of lattice-based constructions with respect to their efficiency for hardware-based implementations.
Design Report Efficient Lattice-based IBE and ABEThis deliverable is a document that will detail the design of advanced lattice-based constructs for identity based encryption and attribute based encryption.
Case study Analysis and ValidationA report describing the results of our analysis of the SAFEcrypto solutions against the case study requirements.
Testbed Design ReportA report describing the network topology, data design and key equipment used to stage the use-case demonstrations.
Design Report Efficient Lattice-based Digital SignaturesThis deliverable is a document that will detail the design of efficient lattice-based digital signature constructions.
Case study Specifications and RequirementsThis document will specify the case studies and provide requirements for the technologies to be developed in SAFEcrypto.
First Interim Management ReportFirst interim management and progress report, describing the project management and technical activities, including results, problems incurred and the corrective actions taken. Also includes an approximate budget forecast.
Overview of related research projectsThis deliverable will outline completed and current projects in similar or related technology areas at both national and European level
Risk and Vulnerability Assessment of Lattice-based Cryptographic ArchitecturesThis deliverable is a document that will provide an in depth analysis of the risks and vulnerabilities for lattice-based cryptographic architectures for the given case studies.
Testing and Benchmarkng ResultsThis deliverable is a report detailing testing and performance results.
Design Report Efficient Lattice-based AuthenticationThis deliverable is a document that will detail the design of efficient lattice-based authentication constructions.
Lattice-based Software Requirements SpecificationThis deliverable is a document that will define a set of software requirements for both resource-constrained embedded platforms and high performance multi-core architectures.
Post Quantum Cryptographic Key Management AssessmentThis deliverable is a document that assesses state-of-the-art in applicable architectures and technologies for key management that may be applicable to post quantum cryptography.
Physical attack-resistant methodologies for lattice-based constructions implemented in softwareThis is a report outlining application-appropriate physical attack-resistant methodologies for lattice-based constructions implemented in software. The report will include experimental and performance results.
Publication of BookA book describing the state-of-the-art in lattice-based cryptography will be published by the end of the project.
State-of-the-Art in physical side channel attacks and resistant technologiesThis deliverable is a document that outlines the state-of-the-art in side channel attacks and countermeasures and a set of guidelines on generic SCA countermeasures that may be applicable for lattice-based cryptographic implementations (both hardware and software).
This deliverable is a prototype and key management solution of the proposed lattice-based key management design, to be used in WP9 as demonstration of this approach.
This deliverable is an extension of software compilers and hardware design tools to support the automatic application of the proposed countermeasures.
SAFEcrypto workshopsThe project participants will organise two lattice-based cryptographic workshops 1.5 and 3.5 years after the project start date (M18 & M42).
A small number of technology and business briefings to be delivered to a wide range of stakeholders.
On-line presenceThe initial version of the project web site will be launched at the start of the project providing information on partners, plans, goals and activities. Social media presence, including Twitter and LinkedIn profiles, will be created.
Pubblicazioni
Autori:
Rafaël Del Pino, Vadim Lyubashevsky, David Pointcheval
Pubblicato in:
Security and Cryptography in Networks (SCN) 2016, Numero LNCS 9841, 2016, Pagina/e 1-6, ISBN 978-3-319-44617-2
Editore:
Springer, Lecture notes in computer science
Autori:
J. Howe, C. Moore, M. O'Neill, F. Regazzoni, T. Güneysu, K. Beeden
Pubblicato in:
Proceedings of the 53rd Annual Design Automation Conference on - DAC '16, 2016, Pagina/e 1-6, ISBN 9781-450342360
Editore:
ACM Press
DOI:
10.1145/2897937.2898037
Autori:
Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
Pubblicato in:
IMA International Conference on Cryptography and Coding. IMACC 2017, Numero Lecture Notes in Computer Science, vol 10655, 2017, Pagina/e 227-246, ISBN 978-3-319-71045-7
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-71045-7_12
Autori:
Tim Guneysu, Tobias Oder
Pubblicato in:
2017 18th International Symposium on Quality Electronic Design (ISQED), Numero 2017, 2017, Pagina/e 319-324, ISBN 978-1-5090-5404-6
Editore:
IEEE
DOI:
10.1109/ISQED.2017.7918335
Autori:
A. Khalid, J. Howe, C. Rafferty, M. O'Neill
Pubblicato in:
2016 International Conference on Field-Programmable Technology (FPT), 2016, Pagina/e 241-244, ISBN 978-1-5090-5602-6
Editore:
IEEE
DOI:
10.1109/FPT.2016.7929543
Autori:
Howe, James; Khalid, Ayesha; Rafferty, Ciara; O'Neill, Maire
Pubblicato in:
IEEE International Symposium of Circuits and Systems, Baltimore, United States. 28/05/2017 - 31/05/2017, Numero 2017, 2018
Editore:
IEEE
Autori:
Howe, J, O'Neill, M,
Pubblicato in:
Proceedings of the International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain, 24-26 July 2017, Numero 2017, 2018
Editore:
Springer
Autori:
Tobias Oder, Tim Guneysu, Felipe Valencia, Ayesha Khalid, Maire O'Neill, Francesco Regazzoni
Pubblicato in:
2016 International Symposium on Integrated Circuits (ISIC), 2016, Pagina/e 1-4, ISBN 978-1-4673-9019-4
Editore:
IEEE
DOI:
10.1109/ISICIR.2016.7829689
Autori:
Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
Pubblicato in:
International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, Paris, France, 30 April - 4 May 2017, Numero LNCS vol 10210, 2017, Pagina/e 601-626
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-56620-7_21
Autori:
Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
Pubblicato in:
IACR International Workshop on Public-Key Cryptography -- PKC 2015, Numero Lecture Notes in Computer Science, vol 9020., 2015, Pagina/e 733-751, ISBN 978-3-662-46447-2
Editore:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-46447-2_33
Autori:
Tobias Oder, Tim Güneysu
Pubblicato in:
International Conference on Cryptography and Information Security in Latin America (Latincrypt 2017). La Habana, Cuba. 20 - 22 September 2017, 2018
Editore:
Latincrypt
Autori:
Maire O'Neill, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, Elizabeth O'Sullivan, David Lund, Gavin McWilliams, Markku-Juhani Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafael del Pino, Michel Abdalla
Pubblicato in:
Proceedings of the ACM International Conference on Computing Frontiers - CF '16, 2016, Pagina/e 315-322, ISBN 9781-450341288
Editore:
ACM Press
DOI:
10.1145/2903150.2907756
Autori:
Khalid, A, Rafferty, C, Howe, J, Brannigan, S, Liu, W, O'Neill, M
Pubblicato in:
IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2018: Proceedings, 2018
Editore:
IEEE
Autori:
Felipe Valencia, Ayesha Khalid, Elizabeth O'Sullivan, Francesco Regazzoni
Pubblicato in:
2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS), 2017, Pagina/e 273-277, ISBN 978-1-5386-3437-0
Editore:
IEEE
DOI:
10.1109/samos.2017.8344640
Autori:
Ayesha Khalid, Tobias Oder, Felipe Valencia, Maire O' Neill, Tim Güneysu, Francesco Regazzoni
Pubblicato in:
Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18, 2018, Pagina/e 365-370, ISBN 9781-450357241
Editore:
ACM Press
DOI:
10.1145/3194554.3194616
Autori:
Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O'Neill
Pubblicato in:
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 2018, Pagina/e 1-5, ISBN 978-1-5386-4881-0
Editore:
IEEE
DOI:
10.1109/iscas.2018.8351009
Autori:
Fan, S, Liu, W, Howe, J, Khalid, A, O'Neill, M
Pubblicato in:
IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2018: Proceedings, 2018
Editore:
IEEE
Autori:
Howe, J, Khalid, A, Regazonni, F, Oswald, E, Martinoli, M
Pubblicato in:
International Symposium on Circuits and systems (ISCAS 19), 2019
Editore:
IEEE
Autori:
M. Abdalla, D. Catalano, D. Fiore, R. Gay, and B. Ursu
Pubblicato in:
CRYPTO 2018. Proceedings of the 38th International Cryptology Conference, Santa Barbara, CA. 19-23 August, Numero 10991, 2018, Pagina/e 579–627
Editore:
LNCS
Autori:
Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu
Pubblicato in:
PQCrypto 2019: The Tenth International Conference on Post-Quantum Cryptography, Chongqing University, Chongqing, May 8-10, 2019, 2019
Editore:
Springer
Autori:
Julian Speith, Tobias Oder, Tim Güneysu
Pubblicato in:
BalkanCryptSec 2018, Iasi, Romania, September 20-21, 2018, 2018
Editore:
Springer
Autori:
Tim Güneysu, Markus Krausz, Tobias Oder, Julian Speith
Pubblicato in:
25th IEEE International Conference on Electronics Circuits and Systems, Bordeaux, France, 2018
Editore:
IEEE
Autori:
Francesco Regazzoni, Austin Fowler, Ilia Polian
Pubblicato in:
Proceedings of the 18th International Conference on Embedded Computer Systems Architectures, Modeling, and Simulation - SAMOS '18, 2018, Pagina/e 173-178, ISBN 9781-450364942
Editore:
ACM Press
DOI:
10.1145/3229631.3264737
Autori:
Felipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni
Pubblicato in:
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Pagina/e 7-12, ISBN 9781-450363747
Editore:
ACM Press
DOI:
10.1145/3178291.3178294
Autori:
Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
Pubblicato in:
22nd edition of the International Conference on Practice and Theory of Public Key Cryptography, Numero April 14-17, 2019, Beijing, China, 2019
Editore:
Springer, LNCS
Autori:
Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
Pubblicato in:
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS '16, 2016, Pagina/e 2-9, ISBN 9781-450342834
Editore:
ACM Press
DOI:
10.1145/2899007.2899011
Autori:
James Howe, Ayesha Khalid, Ciara Rafferty, Francesco Regazzoni, Maire O'Neill
Pubblicato in:
IEEE Transactions on Computers, Numero 67/3, 2018, Pagina/e 322-334, ISSN 0018-9340
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TC.2016.2642962
Autori:
Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
Pubblicato in:
ACM Transactions on Embedded Computing Systems, Numero 16/4, 2017, Pagina/e 1-24, ISSN 1539-9087
Editore:
Association for Computing Machinary, Inc.
DOI:
10.1145/3092951
Autori:
Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., & Stehlé, D.
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2018(1), 2018, Pagina/e 238-268, ISSN 2569-2925
Editore:
RUB
Autori:
Oder, T., Schneider, T., Pöppelmann, T., & Güneysu, T.
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2018(1), 2018, Pagina/e 142-174, ISSN 2569-2925
Editore:
RUB
Autori:
Hamid Nejatollahi, Nikil Dutt, Sandip Ray, Francesco Regazzoni, Indranil Banerjee, Rosario Cammarota
Pubblicato in:
ACM Computing Surveys (CSUR), 2019, ISSN 0360-0300
Editore:
Association for Computing Machinary, Inc.
Autori:
James Howe, Thomas Pöppelmann, Máire O'neill, Elizabeth O'sullivan, Tim Güneysu
Pubblicato in:
ACM Transactions on Embedded Computing Systems, Numero 14/3, 2015, Pagina/e 1-24, ISSN 1539-9087
Editore:
Association for Computing Machinary, Inc.
DOI:
10.1145/2724713
Autori:
Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
Pubblicato in:
IEEE Transactions on Computers, Numero 64/7, 2015, Pagina/e 1954-1967, ISSN 0018-9340
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TC.2014.2346177
Autori:
Séamus Brannigan, Máire O’Neill, Ayesha Khalid, Ciara Rafferty
Pubblicato in:
Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings, Numero 11348, 2018, Pagina/e 65-84, ISBN 978-3-030-05071-9
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-05072-6_5
Autori:
Vadim Lyubashevsky, Thomas Prest
Pubblicato in:
Advances in Cryptology -- EUROCRYPT 2015, Numero LNCS 9056, 2015, Pagina/e 789-815, ISBN 978-3-662-46800-5
Editore:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-46800-5_30
Autori:
Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Pubblicato in:
Progress in Cryptology -- LATINCRYPT 2015, Numero LNCS 9230, 2015, Pagina/e 346-365, ISBN 978-3-319-22174-8
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-22174-8_19
Autori:
Vadim Lyubashevsky, Daniel Wichs
Pubblicato in:
Public-Key Cryptography -- PKC 2015, Numero LNCS 9020, 2015, Pagina/e 716-730, ISBN 978-3-662-46446-5
Editore:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-46447-2_32
È in corso la ricerca di dati su OpenAIRE...
Si è verificato un errore durante la ricerca dei dati su OpenAIRE
Nessun risultato disponibile