Skip to main content

Post-quantum cryptography for long-term security

Rezultaty

Small devices: Intermediate report on physical attacks

This deliverable relates to Task 1.4. This report provides a list with physical attacks that are suitable to attack post-quantum implementations against which implementations need to be validated. It also provides a statement which countermeasures are likely to disable this kind of attacks

Cloud: Security risks in public-key cryptography

This deliverable is a progress report on Task 3.2. An update of this report will be included in D3.4.

Internet: Integration

This deliverable concludes Task 2.3. It describes Internet integration of WP2’s software library, and includes a successful example of high-speed high-security post-quantum Internet communication.

Cloud: Long-term public-key cryptography

This delivearble cludes Task 3.2. It specifies new public-key primitives that are designed to last for 50 years, including a hash-based signature scheme and a code-based encryption scheme. Software implementations will be made publicly available through the Internet.

Management: first progeess report year 1

Activity and management report, including reports on external cooperation and on dissemination activities (planned and achieved).

Small devices: Final report

This deliverable relates to all tasks. It provides all results achieved by the partners in this workpackage and, in particular, a set of security parameters is specified that enable a fair comparison of all implementations. It summarizes recommendations considering the efficient software and hardware implementation of post-quantum algorithms on embedded low-cost devices. In particular, it also includes results and countermeasures obtained from mounting physical attacks against the implementations (Task 1.4).

Internet: Preliminary integration

This deliverable is a progress report on Task 2.3. It will be superseded by D2.5.

Management: second progress report

Activity and management report, including reports on external cooperation and on dissemination activities (planned and achieved).

Standardization: Final report,

The deliverable will conclude the activities undertaken in WP5 and will report on the latest developments and obtained results.

Internet: Portfolio

This deliverable concludes Task 2.1. It describes the most promising post-quantum systems for Internet applications.

Cloud: Advanced applications

This deliverable concludes Task 3.3. It evaluates the security of selected protocols.

Management: Data management plan

Determine which parts of the project will participate in the pilot on open research data and how to organize and manage the data. This deliverable will be updated throughout the lifetime of the project.

Cloud: Security risks in secret-key cryptography

This deliverable is a progress report on Task 3.1. An update of this report will be included in D3.3.

Standardization: Preliminary report

The report will cover all ongoing standardization activities and mid-course achievements towards the objectives of WP5.

Internet: Preliminary portfolio

This deliverable is a progress report on Task 2.1. It will be superseded by D2.3.

Small devices: Intermediate report on algorithms

This deliverable relates to Task 1.1. It provides a report on (preliminary) studies done by the partners summarizing the main particularities of the state-of-the-art works on post-quantum implementations.

Small devices: Intermediate report on optimized hardware,

This deliverable relates to Task 1.3. It provides a report the preliminary hardware implementation results of the selected post-quantum schemes and corresponding parameters for embedded systems.

Small devices: Intermediate report on optimized software

This deliverable relates to Task 1.2. It provides a report the preliminary software implementation results of the selected post-quantum schemes and corresponding parameters for embedded systems.

Cloud: Long-term authenticated ciphers

This deliverable concludes Task 3.1. It specifies new authenticated ciphers that are designed to last for 50 years. Software implementations will be made publicly available through the Internet.

Management: Project website and internal IT communication infrastructure

Launch of the public project website, internal websites and other IT infrastructure.

Internet: Software library,

This deliverable concludes Task 2.2.It describes the functionality and use of WP2’s software library for post-quantum cryptography.

Small devices: Final implementations

This deliverable relates to Tasks 1.2 and 1.3. Software and hardware implementations are delivered and made public together with the corresponding specifications and implementation guidelines.

Small devices: Reference implementations

This deliverable concludes Task 1.1. Reference implementations of selected post-quantum algorithms are implemented and made public together with the corresponding test vectors.

Publikacje

Column Parity Mixers

Autorzy: Stoffelen, Ko; Daemen, Joan
Opublikowane w: IACR Transactions on Symmetric Cryptology, Issue 1, 2018, Page(s) 126-159, ISSN 2519-173X
DOI: 10.13154/tosc.v2018.i1.126-159

Shorter Linear Straight-Line Programs for MDS Matrices

Autorzy: Kranz, Thorsten; Leander, Gregor; Stoffelen, Ko; Wiemer, Friedrich
Opublikowane w: IACR Transactions on Symmetric Cryptology, Issue 4, 2017, ISSN 2519-173X
DOI: 10.13154/tosc.v2017.i4.188-211

Cryptanalysis of GOST2

Autorzy: Ashur, Tomer; Bar-On, Achiya; Dunkelman, Orr
Opublikowane w: IACR Transactions on Symmetric Cryptology, Issue 8, 2017, ISSN 2519-173X
DOI: 10.13154/tosc.v2017.i1.203-214

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

Autorzy: Kölbl, Stefan; Lauridsen, Martin M.; Mendel, Florian; Rechberger, Christian
Opublikowane w: IACR Transactions on Symmetric Cryptology, Issue 5, 2016, ISSN 2519-173X
DOI: 10.13154/tosc.v2016.i2.1-29

Quantum Differential and Linear Cryptanalysis

Autorzy: Kaplan, Marc; Leurent, Gaëtan; Leverrier, Anthony; Naya-Plasencia, María
Opublikowane w: IACR Transactions on Symmetric Cryptology, Issue 9, 2016, ISSN 2519-173X
DOI: 10.13154/tosc.v2016.i1.71-94

Polynomial Time Attack on Wild McEliece Over Quadratic Extensions

Autorzy: Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
Opublikowane w: IEEE Transactions on Information Theory, Issue 63/1, 2017, Page(s) 404-427, ISSN 0018-9448
DOI: 10.1109/TIT.2016.2574841

Breaching the Privacy of Israel's Paper Ballot Voting System

Autorzy: Ashur, Tomer; Dunkelman, Orr; Talmon, Nimrod
Opublikowane w: Lecture Notes in Computer Science, Issue 6, 2016, ISSN 0302-9743

Efficient Slide Attacks

Autorzy: Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
Opublikowane w: Journal of Cryptology, Issue 31/3, 2018, Page(s) 641-670, ISSN 0933-2790
DOI: 10.1007/s00145-017-9266-8

Practical CCA2-Secure and Masked Ring-LWE Implementation

Autorzy: Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
Opublikowane w: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, ISSN 2569-2925
DOI: 10.13154/tches.v2018.i1.142-174

How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function?

Autorzy: Shoni Gilboa, Shay Gueron, Ben Morris
Opublikowane w: Journal of Cryptology, Issue 31/1, 2018, Page(s) 162-171, ISSN 0933-2790
DOI: 10.1007/s00145-017-9253-0

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Autorzy: Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Opublikowane w: Journal of Cryptology, Issue 31/3, 2018, Page(s) 885-916, ISSN 0933-2790
DOI: 10.1007/s00145-017-9273-9

CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme

Autorzy: Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé
Opublikowane w: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, ISSN 2569-2925
DOI: 10.13154/tches.v2018.i1.238-268

Faster Secure Cloud Computations with a Trusted Proxy

Autorzy: Nir Drucker, Shay Gueron, Benny Pinkas
Opublikowane w: IEEE Security & Privacy, Issue 15/6, 2017, Page(s) 61-67, ISSN 1540-7993
DOI: 10.1109/MSP.2017.4251121

Generalized Gabidulin codes over fields of any characteristic

Autorzy: Daniel Augot, Pierre Loidreau, Gwezheneg Robert
Opublikowane w: Designs, Codes and Cryptography, Issue 86/8, 2018, Page(s) 1807-1848, ISSN 0925-1022
DOI: 10.1007/s10623-017-0425-6

Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols

Autorzy: Nina Bindel, Johannes Buchmann, Susanne Rieß
Opublikowane w: International Journal of Information Security, 2017, ISSN 1615-5262
DOI: 10.1007/s10207-017-0397-6

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

Autorzy: Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
Opublikowane w: ACM Transactions on Embedded Computing Systems, Issue 16/4, 2017, Page(s) 1-24, ISSN 1539-9087
DOI: 10.1145/3092951

Post-quantum cryptography

Autorzy: Daniel J. Bernstein, Tanja Lange
Opublikowane w: Nature, Issue 549/7671, 2017, Page(s) 188-194, ISSN 0028-0836
DOI: 10.1038/nature23461

Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes

Autorzy: Alain Couvreur, Irene Marquez-Corbella, Ruud Pellikaan
Opublikowane w: IEEE Transactions on Information Theory, Issue 63/8, 2017, Page(s) 5404-5418, ISSN 0018-9448
DOI: 10.1109/TIT.2017.2712636

Memory Encryption for General-Purpose Processors

Autorzy: Shay Gueron
Opublikowane w: IEEE Security & Privacy, Issue 14/6, 2016, Page(s) 54-62, ISSN 1540-7993
DOI: 10.1109/MSP.2016.124

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem

Autorzy: Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Opublikowane w: IEEE Transactions on Information Forensics and Security, Issue 11/6, 2016, Page(s) 1093-1105, ISSN 1556-6013
DOI: 10.1109/TIFS.2015.2509944

Masking ring-LWE

Autorzy: Oscar Reparaz, Sujoy Sinha Roy, Ruan de Clercq, Frederik Vercauteren, Ingrid Verbauwhede
Opublikowane w: Journal of Cryptographic Engineering, Issue 6/2, 2016, Page(s) 139-153, ISSN 2190-8508
DOI: 10.1007/s13389-016-0126-5

Implementing QC-MDPC McEliece Encryption

Autorzy: Ingo Von Maurich, Tobias Oder, Tim Güneysu
Opublikowane w: ACM Transactions on Embedded Computing Systems, Issue 14/3, 2015, Page(s) 1-27, ISSN 1539-9087
DOI: 10.1145/2700102

Fast Quicksort Implementation Using AVX Instructions

Autorzy: Shay Gueron, Vlad Krasnov
Opublikowane w: The Computer Journal, 2016, Page(s) bxv063, ISSN 0010-4620
DOI: 10.1093/comjnl/bxv063

Structural cryptanalysis of McEliece schemes with compact keys

Autorzy: Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
Opublikowane w: Designs, Codes and Cryptography, Issue 79/1, 2016, Page(s) 87-112, ISSN 0925-1022
DOI: 10.1007/s10623-015-0036-z

Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups

Autorzy: Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret, Frederic de Portzamparc, Jean-Pierre Tillich
Opublikowane w: IEEE Transactions on Information Theory, Issue 62/1, 2016, Page(s) 184-198, ISSN 0018-9448
DOI: 10.1109/TIT.2015.2493539

Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware

Autorzy: Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
Opublikowane w: IEEE Transactions on Computers, Issue 64/7, 2015, Page(s) 1954-1967, ISSN 0018-9340
DOI: 10.1109/TC.2014.2346177

Column Parity Mixers

Autorzy: Stoffelen, Ko; Daemen, Joan
Opublikowane w: 2519-173X, Issue 1, 2018, ISSN 2519-173X
DOI: 10.13154/tosc.v2018.i1.126-159

CRYSTALS – Dilithium: Digital Signatures from Module Lattices

Autorzy: Ducas, L.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehle, D.
Opublikowane w: IACR Transactions on Cryptographic Hardware and Embedded System, Issue 1, 2018, Page(s) 238 -- 268, ISSN 2569-2925
DOI: 10.13154/tches.v2018.i1.238-268

On error distributions in ring-based LWE

Autorzy: Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Opublikowane w: LMS Journal of Computation and Mathematics, Issue 19/A, 2016, Page(s) 130-145, ISSN 1461-1570
DOI: 10.1112/S1461157016000280

Computational problems in supersingular elliptic curve isogenies

Autorzy: Steven D. Galbraith, Frederik Vercauteren
Opublikowane w: Quantum Information Processing, Issue 17/10, 2018, ISSN 1570-0755
DOI: 10.1007/s11128-018-2023-6

CAKE: Code-based Algorithm for Key Encapsulation

Autorzy: Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
Opublikowane w: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings, 2017, Page(s) 207-226
DOI: 10.1007/978-3-319-71045-7_11

Statistical decoding

Autorzy: Thomas Debris-Alazard, Jean-Pierre Tillich
Opublikowane w: 2017 IEEE International Symposium on Information Theory (ISIT), 2017, Page(s) 1798-1802
DOI: 10.1109/ISIT.2017.8006839

Identity-Based Encryption from Codes with Rank Metric

Autorzy: Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
Opublikowane w: CRYPTO 2017: Advances in Cryptology, 2017, Page(s) 194-224
DOI: 10.1007/978-3-319-63697-9_7

Simpira v2: A Family of Efficient Permutations Using the AES Round Function

Autorzy: Shay Gueron, Nicky Mouha
Opublikowane w: ASIACRYPT 2016: Advances in Cryptology, 2016, Page(s) 95-125
DOI: 10.1007/978-3-662-53887-6_4

Cryptanalysis of the FLIP Family of Stream Ciphers

Autorzy: Sébastien Duval, Virginie Lallemand, Yann Rotella
Opublikowane w: CRYPTO 2016: Advances in Cryptology, 2016, Page(s) 457-475
DOI: 10.1007/978-3-662-53018-4_17

Hypersurfaces in Weighted Projective Spaces Over Finite Fields with Applications to Coding Theory

Autorzy: Yves Aubry, Wouter Castryck, Sudhir R. Ghorpade, Gilles Lachaud, Michael E. O’Sullivan, Samrith Ram
Opublikowane w: Algebraic Geometry for Coding Theory and Cryptography, 2017, Page(s) 25-61
DOI: 10.1007/978-3-319-63931-4_2

Instruction Scheduling and Register Allocation on ARM Cortex-M

Autorzy: Stoffelen, K.
Opublikowane w: SPEED-B - Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, 1 - 9. [S.l. : s.n.], 2016

HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction

Autorzy: Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
Opublikowane w: AFRICACRYPT 2018, 2018, Page(s) 203-216
DOI: 10.1007/978-3-319-89339-6_12

Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs.

Autorzy: Tobias Oder and Tim Güneysu
Opublikowane w: Latincrypt, Issue to appear, 2019

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM

Autorzy: Joppe Bos, Leo Ducas, Eike Kiltz, T Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehle
Opublikowane w: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 353-367
DOI: 10.1109/eurosp.2018.00032

Post-quantum authentication in OpenSSL with hash-based signatures

Autorzy: Denis Butin, Julian Walde, Johannes Buchmann
Opublikowane w: 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU), 2017, Page(s) 1-6
DOI: 10.23919/icmu.2017.8330093

Differential Power Analysis of XMSS and SPHINCS

Autorzy: Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
Opublikowane w: COSADE 2018, 2018, Page(s) 168-188
DOI: 10.1007/978-3-319-89641-0_10

QC-MDPC: A Timing Attack and a CCA2 KEM

Autorzy: Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
Opublikowane w: PQCrypto 2018, 2018, Page(s) 47-76
DOI: 10.1007/978-3-319-79063-3_3

Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations

Autorzy: Daniel J. Bernstein, Bo-Yin Yang
Opublikowane w: PQCrypto 2018, 2018, Page(s) 487-506
DOI: 10.1007/978-3-319-79063-3_23

Post-quantum security of the sponge construction.. Post-Quantum Cryptography.

Autorzy: Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
Opublikowane w: PQCrypto 2018, 2018, Page(s) 185-204
DOI: 10.1007/978-3-319-79063-3_9

SOFIA: MQ-based signatures in the QROM

Autorzy: Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Opublikowane w: PKC 2018, 2018, Page(s) 3-33
DOI: 10.1007/978-3-319-76581-5_1

Putting Wings on SPHINCS

Autorzy: Stefan Kölbl
Opublikowane w: PQCrypto 2018, 2018, Page(s) 205-226
DOI: 10.1007/978-3-319-79063-3_10

Rounded Gaussians

Autorzy: Andreas Hülsing, Tanja Lange, Kit Smeets
Opublikowane w: PKC 2018, 2018, Page(s) 728-757
DOI: 10.1007/978-3-319-76581-5_25

Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α * q^β

Autorzy: Patrick Holzer, Thomas Wunderer, Johannes A. Buchmann
Opublikowane w: Indocrypt 2017, 2017, Page(s) 346-368
DOI: 10.1007/978-3-319-71667-1_18

Revisiting the Expected Cost of Solving uSVP and Applications to LWE

Autorzy: Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
Opublikowane w: Asiacrypt 2017, 2017, Page(s) 297-322
DOI: 10.1007/978-3-319-70694-8_11

NTRU prime: reducing attack surface at low cost

Autorzy: Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
Opublikowane w: SAC 2017, 2018, Page(s) 235-260
DOI: 10.1007/978-3-319-72565-9_12

An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography

Autorzy: André Chailloux, María Naya-Plasencia, André Schrottenloher
Opublikowane w: Asiacrypt 2017, 2017, Page(s) 211-240
DOI: 10.1007/978-3-319-70697-9_8

Lattice Klepto: turning post-quantum crypto against itself

Autorzy: Robin Kwant, Tanja Lange, Kimberley Thissen
Opublikowane w: SAC 2017, 2018, Page(s) 336-354
DOI: 10.1007/978-3-319-72565-9_17

Gimli: a cross-platform permutation

Autorzy: Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
Opublikowane w: CHES 2017, 2017, Page(s) 299-320
DOI: 10.1007/978-3-319-66787-4_15

"""Oops, I did it again"" - Security of One-Time Signatures under Two-Message Attacks"

Autorzy: Leon Groot Bruinderink, Andreas Hülsing
Opublikowane w: SAC 2017, 2018, Page(s) 299-322
DOI: 10.1007/978-3-319-72565-9_15

Sliding Right into Disaster: Left-to-Right Sliding Windows Leak

Autorzy: Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
Opublikowane w: CHES 2017, 2017, Page(s) 555-576
DOI: 10.1007/978-3-319-66787-4_27

Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics

Autorzy: Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
Opublikowane w: Foundations and Practice of Security, 2017, Page(s) 225-241
DOI: 10.1007/978-3-319-75650-9_15

To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures

Autorzy: Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
Opublikowane w: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1843-1855
DOI: 10.1145/3133956.3134023

Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation

Autorzy: Shay Gueron, Yehuda Lindell
Opublikowane w: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1019-1036
DOI: 10.1145/3133956.3133992

Combining Homomorphic Encryption with Trusted Execution Environment - A Demonstration with Paillier Encryption and SGX

Autorzy: Nir Drucker, Shay Gueron
Opublikowane w: Proceedings of the 2017 International Workshop on Managing Insider Security Threats - MIST '17, 2017, Page(s) 85-88
DOI: 10.1145/3139923.3139933

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Autorzy: Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
Opublikowane w: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1825-1842
DOI: 10.1145/3133956.3133997

Using Scan Side Channel for Detecting IP Theft

Autorzy: Leonid Azriel, Ran Ginosar, Shay Gueron, Avi Mendelson
Opublikowane w: Proceedings of the Hardware and Architectural Support for Security and Privacy 2016 on - HASP 2016, 2016, Page(s) 1-8
DOI: 10.1145/2948618.2948619

Paillier-encrypted databases with fast aggregated queries

Autorzy: Nir Drucker, Shay Gueron
Opublikowane w: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, Page(s) 848-853
DOI: 10.1109/CCNC.2017.7983244

High-speed key encapsulation from NTRU.

Autorzy: Andreas Hülsing, Joost Rijneveld, John Schanck, Peter Schwabe
Opublikowane w: CHES 2017, 2017, Page(s) 232-252
DOI: 10.1007/978-3-319-66787-4_12

Short generators without quantum computers: the case of multiquadratics

Autorzy: Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
Opublikowane w: Eurocrypt 2017, 2017, Page(s) 27-59
DOI: 10.1007/978-3-319-56620-7_2

Boosting Authenticated Encryption Robustness with Minimal Modifications

Autorzy: Tomer Ashur, Orr Dunkelman, Atul Luykx
Opublikowane w: CRYPTO 2017, 2017, Page(s) 3-33
DOI: 10.1007/978-3-319-63697-9_1

Memory-Efficient Algorithms for Finding Needles in Haystacks.

Autorzy: Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Opublikowane w: Crypto 2017, 2017, Page(s) 185-206
DOI: 10.1007/978-3-662-53008-5_7

Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency (special session)

Autorzy: Nina Bindel, Juliane Krämer, Johannes Schreiber
Opublikowane w: Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion - CODES '17, 2017, Page(s) 1-3
DOI: 10.1145/3125502.3125546

Post-quantum RSA.

Autorzy: Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
Opublikowane w: PQCrypto 2017, 2017, Page(s) 311-329
DOI: 10.1007/978-3-319-59879-6_18

Quantum Information Set Decoding Algorithms

Autorzy: Ghazal Kachigar, Jean-Pierre Tillich
Opublikowane w: PQCrypto 2017, 2017, Page(s) 69-89
DOI: 10.1007/978-3-319-59879-6_5

Transitioning to a Quantum-Resistant Public Key Infrastructure

Autorzy: Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
Opublikowane w: PQCrypto 2017, 2017, Page(s) 384-405
DOI: 10.1007/978-3-319-59879-6_22

A Low-Resource Quantum Factoring Algorithm

Autorzy: Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
Opublikowane w: PQCrypto 2017, 2017, Page(s) 330-346
DOI: 10.1007/978-3-319-59879-6_19

Revisiting TESLA in the quantum random oracle model

Autorzy: Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
Opublikowane w: PQCrypto 2017, 2017, Page(s) 143-162
DOI: 10.1007/978-3-319-59879-6_9

A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE

Autorzy: Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
Opublikowane w: PQCrypto 2017, 2017, Page(s) 184-202
DOI: 10.1007/978-3-319-59879-6_11

XOR of PRPs in a Quantum World

Autorzy: Bart Mennink, Alan Szepieniec
Opublikowane w: PQCrypto 2017, 2017, Page(s) 367-383
DOI: 10.1007/978-3-319-59879-6_21

Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things

Autorzy: Tim Guneysu, Tobias Oder
Opublikowane w: 2017 18th International Symposium on Quality Electronic Design (ISQED), 2017, Page(s) 319-324
DOI: 10.1109/ISQED.2017.7918335

A code-based blind signature

Autorzy: Olivier Blazy, Philippe Gaborit, Julien Schrek, Nicolas Sendrier
Opublikowane w: 2017 IEEE International Symposium on Information Theory (ISIT), 2017, Page(s) 2718-2722
DOI: 10.1109/ISIT.2017.8007023

RingRainbow - An Efficient Multivariate Ring Signature Scheme

Autorzy: Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Opublikowane w: Africacrypt 2017, 2017, Page(s) 3-20
DOI: 10.1007/978-3-319-57339-7_1

Fault Attacks on Encrypted General Purpose Compute Platforms

Autorzy: Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter
Opublikowane w: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17, 2017, Page(s) 197-204
DOI: 10.1145/3029806.3029836

Low-Communication Parallel Quantum Multi-Target Preimage Search

Autorzy: Gustavo Banegas, Daniel J. Bernstein
Opublikowane w: SAC 2017, 2017, Page(s) 325-335
DOI: 10.1007/978-3-319-72565-9_16

Surnaming Schemes, Fast Verification, and Applications to SGX Technology

Autorzy: Dan Boneh, Shay Gueron
Opublikowane w: CT-RSA 2017, 2017, Page(s) 149-164
DOI: 10.1007/978-3-319-52153-4_9

A Practical Multivariate Blind Signature Scheme

Autorzy: Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
Opublikowane w: Financial Cryptography and Data Security 2017, 2017, Page(s) 437-454
DOI: 10.1007/978-3-319-70972-7_25

Attacking Embedded ECC Implementations Through cmov Side Channels

Autorzy: Erick Nascimento, Łukasz Chmielewski, David Oswald, Peter Schwabe
Opublikowane w: SAC 2016, 2017, Page(s) 99-119
DOI: 10.1007/978-3-319-69453-5_6

Solving binary MQ with Grover's algorithm

Autorzy: Peter Schwabe, Bas Westerbaan
Opublikowane w: SPACE 2016, 2016, Page(s) 303-322
DOI: 10.1007/978-3-319-49445-6_17

Fast Arithmetic Modulo 2^x p^y ± 1

Autorzy: Joppe W. Bos, Simon Friedberger
Opublikowane w: 2017 IEEE 24th Symposium on Computer Arithmetic (ARITH), 2017, Page(s) 148-155
DOI: 10.1109/ARITH.2017.15

Attacks on Encrypted Memory and Constructions for Memory Protection

Autorzy: Shay Gueron
Opublikowane w: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Issue FDTC 2016, 2016, Page(s) 1-3
DOI: 10.1109/FDTC.2016.20

Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks

Autorzy: Nina Bindel, Johannes Buchmann, Juliane Kramer
Opublikowane w: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016, Page(s) 63-77
DOI: 10.1109/FDTC.2016.11

An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation

Autorzy: Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
Opublikowane w: Africacrypt 2016, 2016, Page(s) 44-60
DOI: 10.1007/978-3-319-31517-1_3

Creating Cryptographic Challenges Using Multi-Party Computation - The LWE Challenge

Autorzy: Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
Opublikowane w: Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography - AsiaPKC '16, 2016, Page(s) 11-20
DOI: 10.1145/2898420.2898422

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack

Autorzy: Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
Opublikowane w: Africacrypt 2016, 2016, Page(s) 24-43
DOI: 10.1007/978-3-319-31517-1_2

Frodo - Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

Autorzy: Joppe Bos, Craig Costello, Leo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
Opublikowane w: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Page(s) 1006-1018
DOI: 10.1145/2976749.2978425

Worst case QC-MDPC decoder for McEliece cryptosystem

Autorzy: Julia Chaulet, Nicolas Sendrier
Opublikowane w: 2016 IEEE International Symposium on Information Theory (ISIT), 2016, Page(s) 1366-1370
DOI: 10.1109/ISIT.2016.7541522

Enhancing the Scalability and Memory Usage of Hashsieve on Multi-core CPUs

Autorzy: Artur Mariano, Christian Bischof
Opublikowane w: 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), 2016, Page(s) 545-552
DOI: 10.1109/PDP.2016.31

GCM-SIV - Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte

Autorzy: Shay Gueron, Yehuda Lindell
Opublikowane w: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Page(s) 109-119
DOI: 10.1145/2810103.2813613

Fast Garbling of Circuits Under Standard Assumptions

Autorzy: Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
Opublikowane w: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Page(s) 567-578
DOI: 10.1145/2810103.2813619

High-Performance and Lightweight Lattice-Based Public-Key Encryption

Autorzy: Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
Opublikowane w: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS '16, 2016, Page(s) 2-9
DOI: 10.1145/2899007.2899011

Information sets of Multiplicity codes

Autorzy: Daniel Augot, Francoise Levy-dit-Vehel, Cuong M. Ngo
Opublikowane w: 2015 IEEE International Symposium on Information Theory (ISIT), 2015, Page(s) 2401-2405
DOI: 10.1109/ISIT.2015.7282886

New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem

Autorzy: Adrien Hauteville, Jean-Pierre Tillich
Opublikowane w: 2015 IEEE International Symposium on Information Theory (ISIT), 2015, Page(s) 2747-2751
DOI: 10.1109/ISIT.2015.7282956

Post-quantum Key Exchange -- A New Hope

Autorzy: Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
Opublikowane w: 25th USENIX Security Symposium (USENIX Security 16), 2016

Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP

Autorzy: Artur Mariano, Christian Bischof, Thijs Laarhoven
Opublikowane w: 2015 44th International Conference on Parallel Processing, 2015, Page(s) 590-599
DOI: 10.1109/ICPP.2015.68

Using Reed-Solomon codes in the (U | U + V ) construction and an application to cryptography

Autorzy: Irene Marquez-Corbella, Jean-Pierre Tillich
Opublikowane w: 2016 IEEE International Symposium on Information Theory (ISIT), 2016, Page(s) 930-934
DOI: 10.1109/ISIT.2016.7541435

A new hope on ARM Cortex-M

Autorzy: Alkim, E.; Jakubeit, P.; Schwabe, P.; Carlet, C.; Hasan, A.; Saraswat, V.
Opublikowane w: Security, Privacy, and Applied Cryptography Engineering. SPACE 2016. Lecture Notes in Computer Science, Issue 10076, 2016, Page(s) 332-349
DOI: 10.1007/978-3-319-49445-6_19

A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded Encoding Schemes

Autorzy: Albrecht, M.; Bai, S.; Ducas, Léo; Robshaw, M.; Katz, J.
Opublikowane w: Advances in Cryptology – CRYPTO 2016, Lecture Notes in Computer Science, Issue 9814, 2016, Page(s) 153-178
DOI: 10.1007/978-3-662-53018-4_6

All the AES You Need on Cortex-M3 and M4

Autorzy: Schwabe, P.; Stoffelen, K.; Avanzi, R.; Heys, H.
Opublikowane w: Selected Areas in Cryptography – SAC 2016, Lecture notes in computer science, Issue 10532, 2017, Page(s) 180 - 194
DOI: 10.1007/978-3-319-69453-5_10

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Autorzy: Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny
Opublikowane w: Eurocrypt 2019, lecture notes in computer science, 2019

Post-quantum key exchange – a new hope

Autorzy: Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe.
Opublikowane w: 25th USENIX Security Symposium, 2016, Page(s) 327--343

The Advantage of Truncated Permutations

Autorzy: Gilboa, Shoni; Gueron, Shay
Opublikowane w: 2016

The decoding failure probability of MDPC codes

Autorzy: Tillich, Jean-Pierre
Opublikowane w: 2018

BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation

Autorzy: Bardet , Magali; Barelli , Elise; Blazy , Olivier; Canto Torres , Rodolfo; Couvreur , Alain; Gaborit , Philippe; Otmani , Ayoub; Sendrier , Nicolas; Tillich , Jean-Pierre
Opublikowane w: submission to the NIST post quantum cryptography standardization process. 2017, 2017

BIKE: Bit Flipping Key Encapsulation

Autorzy: Aragon , Nicolas; Barreto , Paulo ,; Bettaieb , Slim; Bidoux , Loïc; Blazy , Olivier; Deneuville , Jean-Christophe; Gaborit , Philippe; Gueron , Shay; Guneysu , Tim; Aguilar Melchor , Carlos; Misoczki , Rafael; Persichetti , Edoardo; Sendrier , Nicolas; Tillich , Jean-Pierre; Zémor , Gilles
Opublikowane w: https://hal.archives-ouvertes.fr/hal-01671903, 2017

XMSS: eXtended Merkle Signature Scheme

Autorzy: A. Huelsing D. Butin S. Gazdag J. Rijneveld A. Mohaisen
Opublikowane w: RFC, Issue 8391, 2018
DOI: 10.17487/RFC8391

Towards KEM Unification

Autorzy: Daniel J. Bernstein and Edoardo Persichetti
Opublikowane w: IACR ePrint archive, Issue 2018/526, 2018

Is the security of quantum cryptography guaranteed by the laws of physics?

Autorzy: Daniel J. Bernstein
Opublikowane w: quant-ph arXiv, Issue 1803.04520, 2018

RankSynd a PRNG Based on Rank Metric

Autorzy: Philippe Gaborit, Adrien Hauteville, Jean-Pierre Tillich
Opublikowane w: Post-Quantum Cryptography, 2016, Page(s) 18-28
DOI: 10.1007/978-3-319-29360-8_2

Optimizing S-Box Implementations for Several Criteria Using SAT Solvers

Autorzy: Ko Stoffelen
Opublikowane w: Fast Software Encryption, 2016, Page(s) 140-160
DOI: 10.1007/978-3-662-52993-5_8

IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter

Autorzy: Ingo von Maurich, Lukas Heberle, Tim Güneysu
Opublikowane w: Post-Quantum Cryptography, 2016, Page(s) 1-17
DOI: 10.1007/978-3-319-29360-8_1

Provably Weak Instances of Ring-LWE Revisited

Autorzy: Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Opublikowane w: Advances in Cryptology – EUROCRYPT 2016, 2016, Page(s) 147-167
DOI: 10.1007/978-3-662-49890-3_6

Analysis of Information Set Decoding for a Sub-linear Error Weight

Autorzy: Rodolfo Canto Torres, Nicolas Sendrier
Opublikowane w: Post-Quantum Cryptography, 2016, Page(s) 144-161
DOI: 10.1007/978-3-319-29360-8_10

Differential Power Analysis of a McEliece Cryptosystem

Autorzy: Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Opublikowane w: Applied Cryptography and Network Security, 2015, Page(s) 538-556
DOI: 10.1007/978-3-319-28166-7_26

Mitigating Multi-target Attacks in Hash-Based Signatures

Autorzy: Andreas Hülsing, Joost Rijneveld, Fang Song
Opublikowane w: Public-Key Cryptography – PKC 2016, 2016, Page(s) 387-416
DOI: 10.1007/978-3-662-49384-7_15

ARMed SPHINCS

Autorzy: Andreas Hülsing, Joost Rijneveld, Peter Schwabe
Opublikowane w: Public-Key Cryptography – PKC 2016, 2016, Page(s) 446-470
DOI: 10.1007/978-3-662-49384-7_17

A Masked Ring-LWE Implementation

Autorzy: Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Opublikowane w: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 683-702
DOI: 10.1007/978-3-662-48324-4_34

Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes

Autorzy: Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich
Opublikowane w: Post-Quantum Cryptography, 2016, Page(s) 118-143
DOI: 10.1007/978-3-319-29360-8_9

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Autorzy: Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Opublikowane w: Fast Software Encryption, 2016, Page(s) 313-333
DOI: 10.1007/978-3-662-52993-5_16

An Efficient Attack on a Code-Based Signature Scheme

Autorzy: Aurélie Phesso, Jean-Pierre Tillich
Opublikowane w: Post-Quantum Cryptography, 2016, Page(s) 86-103
DOI: 10.1007/978-3-319-29360-8_7

Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems

Autorzy: Alan Szepieniec, Jintai Ding, Bart Preneel
Opublikowane w: Post-Quantum Cryptography, 2016, Page(s) 182-196
DOI: 10.1007/978-3-319-29360-8_12

Additively Homomorphic Ring-LWE Masking

Autorzy: Oscar Reparaz, Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Opublikowane w: Post-Quantum Cryptography, 2016, Page(s) 233-244
DOI: 10.1007/978-3-319-29360-8_15

Speeding up R-LWE Post-quantum Key Exchange

Autorzy: Shay Gueron, Fabian Schlieker
Opublikowane w: Secure IT Systems, 2016, Page(s) 187-198
DOI: 10.1007/978-3-319-47560-8_12

Semantic Security and Indistinguishability in the Quantum World

Autorzy: Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
Opublikowane w: Advances in Cryptology – CRYPTO 2016, 2016, Page(s) 60-89
DOI: 10.1007/978-3-662-53015-3_3

Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme

Autorzy: Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
Opublikowane w: Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 323-345
DOI: 10.1007/978-3-662-53140-2_16

Design Principles for HFEv- Based Multivariate Signature Schemes

Autorzy: Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding
Opublikowane w: Advances in Cryptology -- ASIACRYPT 2015, 2015, Page(s) 311-334
DOI: 10.1007/978-3-662-48797-6_14

High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers

Autorzy: Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Opublikowane w: Progress in Cryptology -- LATINCRYPT 2015, 2015, Page(s) 346-365
DOI: 10.1007/978-3-319-22174-8_19

Arithmetic Addition over Boolean Masking

Autorzy: Tobias Schneider, Amir Moradi, Tim Güneysu
Opublikowane w: Applied Cryptography and Network Security, 2015, Page(s) 559-578
DOI: 10.1007/978-3-319-28166-7_27

Masking Large Keys in Hardware: A Masked Implementation of McEliece

Autorzy: Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Opublikowane w: Selected Areas in Cryptography – SAC 2015, 2016, Page(s) 293-309
DOI: 10.1007/978-3-319-31301-6_18

Breaking Symmetric Cryptosystems Using Quantum Period Finding

Autorzy: Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María  Naya-Plasencia
Opublikowane w: Advances in Cryptology – CRYPTO 2016, 2016, Page(s) 207-237
DOI: 10.1007/978-3-662-53008-5_8

QcBits: Constant-Time Small-Key Code-Based Cryptography

Autorzy: Tung Chou
Opublikowane w: Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 280-300
DOI: 10.1007/978-3-662-53140-2_14

MQSAS - A Multivariate Sequential Aggregate Signature Scheme

Autorzy: Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Opublikowane w: Information Security, 2016, Page(s) 426-439
DOI: 10.1007/978-3-319-45871-7_25

The Shortest Signatures Ever

Autorzy: Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Opublikowane w: Progress in Cryptology – INDOCRYPT 2016, 2016, Page(s) 61-77
DOI: 10.1007/978-3-319-49890-4_4

From 5-Pass $$\mathcal {MQ}$$ -Based Identification to $$\mathcal {MQ}$$ -Based Signatures

Autorzy: Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Opublikowane w: Advances in Cryptology – ASIACRYPT 2016, Issue 10032, 2016, Page(s) 135-165
DOI: 10.1007/978-3-662-53890-6_5

CSIDH: An Efficient Post-Quantum Commutative Group Action

Autorzy: Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
Opublikowane w: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 395-427
DOI: 10.1007/978-3-030-03332-3_15