Skip to main content

Engineering post-quantum cryptography

Deliverables

Data Management Plan

Data Management Plan as required by the ORDP

Publications

NTT Multiplication for NTT-unfriendly Rings

Author(s): Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 159-188, ISSN 2569-2925
DOI: 10.46586/tches.v2021.i2.159-188

Rainbow on Cortex-M4

Author(s): Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 650-675, ISSN 2569-2925
DOI: 10.46586/tches.v2021.i4.650-675

Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis

Author(s): Guilherme Perin, Łukasz Chmielewski, Stjepan Picek
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 337-364, ISSN 2569-2925
DOI: 10.13154/tches.v2020.i4.337-364

Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

Author(s): Denisa O. C. Greconici, Matthias J. Kannwischer, Daan Sprenkels
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 1-24, ISSN 2569-2925
DOI: 10.46586/tches.v2021.i1.1-24

Single-Trace Attacks on Keccak

Author(s): Matthias J. Kannwischer, Peter Pessl, Robert Primas
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Issue 2020 Issue 3, 2020, Page(s) to appear, ISSN 2569-2925

Systematic Side-Channel Analysis of Curve25519 with Machine Learning

Author(s): Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
Published in: Journal of Hardware and Systems Security, Issue 4/4, 2020, Page(s) 314-328, ISSN 2509-3428
DOI: 10.1007/s41635-020-00106-w

Fault Injection as an Oscilloscope: Fault Correlation Analysis

Author(s): Albert Spruyt, Alyssa Milburn, Łukasz Chmielewski
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 192-216, ISSN 2569-2925
DOI: 10.46586/tches.v2021.i1.192-216

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

Author(s): Guilherme Perin, Łukasz Chmielewski, Lejla Batina, Stjepan Picek
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 343-372, ISSN 2569-2925
DOI: 10.46586/tches.v2021.i1.343-372

Implementing and Measuring KEMTLS

Author(s): Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
Published in: Progress in Cryptology – LATINCRYPT 2021, Issue LNCS, volume 12912, 2021, Page(s) 88-107
DOI: 10.1007/978-3-030-88238-9_5

More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys

Author(s): Peter Schwabe, Douglas Stebila, Thom Wiggers
Published in: Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I, Issue 12972, 2021, Page(s) 3-22
DOI: 10.1007/978-3-030-88418-5_1

Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the “Classic McEliece” Hardware Reference Implementation

Author(s): Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, Issue 12491, 2020, Page(s) 881-910
DOI: 10.1007/978-3-030-64837-4_29

Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4

Author(s): Leon Botros, Matthias J. Kannwischer, Peter Schwabe
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 209-228
DOI: 10.1007/978-3-030-23696-0_11

Faster Multiplication in $$\mathbb {Z}_{2^m}[x]$$ on Cortex-M4 to Speed up NIST PQC Candidates

Author(s): Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
Published in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Issue 11464, 2019, Page(s) 281-301
DOI: 10.1007/978-3-030-21568-2_14

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages

Author(s): Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Issue 11923, 2019, Page(s) 285-314
DOI: 10.1007/978-3-030-34618-8_10

A Reaction Attack Against Cryptosystems Based on LRPC Codes

Author(s): Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
Published in: Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings, Issue 11774, 2019, Page(s) 197-216
DOI: 10.1007/978-3-030-30530-7_10

Assembly or Optimized C for Lightweight Cryptography on RISC-V?

Author(s): Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Daan Sprenkels, Benoit Viguier
Published in: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, Issue 12579, 2020, Page(s) 526-545
DOI: 10.1007/978-3-030-65411-5_26

Verifying Post-Quantum Signatures in 8 kB of RAM

Author(s): Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
Published in: Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings, Issue 12841, 2021, Page(s) 215-233
DOI: 10.1007/978-3-030-81293-5_12

Post-Quantum TLS Without Handshake Signatures

Author(s): Peter Schwabe, Douglas Stebila, Thom Wiggers
Published in: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, Page(s) 1461-1480
DOI: 10.1145/3372297.3423350

The SPHINCS + Signature Framework

Author(s): Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 2129-2146
DOI: 10.1145/3319535.3363229

pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4

Author(s): Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen
Published in: Workshop Record of the Second PQC Standardization Conference, 2019

Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code

Author(s): Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
Published in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, Page(s) 685-699
DOI: 10.1145/3460120.3485380

Practically Solving LPN

Author(s): Thom Wiggers, Simona Samardjiska
Published in: 2021 IEEE International Symposium on Information Theory (ISIT), 2021, Page(s) 2399-2404
DOI: 10.1109/isit45174.2021.9518109

Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks

Author(s): Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stottinger
Published in: 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2020, Page(s) 57-65
DOI: 10.1109/fdtc51366.2020.00015