Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Engineering post-quantum cryptography

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

NTT Multiplication for NTT-unfriendly Rings (opens in new window)

Author(s): Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 159-188, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2021.i2.159-188

Rainbow on Cortex-M4 (opens in new window)

Author(s): Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 650-675, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2021.i4.650-675

Tighter Trail Bounds for Xoodoo (opens in new window)

Author(s): Silvia Mella, Joan Daemen, Gilles Van Assche
Published in: IACR Transactions on Symmetric Cryptology, Issue 2023-4, 2023, Page(s) 187–214, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2023.i4.187-214

Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis (opens in new window)

Author(s): Guilherme Perin, Łukasz Chmielewski, Stjepan Picek
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 337-364, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.13154/tches.v2020.i4.337-364

X-Wing: The Hybrid KEM You've Been Looking For (opens in new window)

Author(s): Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan
Published in: IACR Communications in Cryptology, Issue volume 1, issue 1, 2024
Publisher: IACR
DOI: 10.62056/a3qj89n4e

SoK: SCA-secure ECC in software – mission impossible? (opens in new window)

Author(s): Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2023-1, 2022, Page(s) 557-589, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2023.i1.557-589

Compact Dilithium Implementations on Cortex-M3 and Cortex-M4 (opens in new window)

Author(s): Denisa O. C. Greconici, Matthias J. Kannwischer, Daan Sprenkels
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 1-24, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2021.i1.1-24

Optimizations and Practicality of High-Security CSIDH (opens in new window)

Author(s): Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers
Published in: IACR Communications in Cryptology, Issue volume 1, issue 1, 2024
Publisher: IACR
DOI: 10.62056/anjbksdja

High-assurance zeroization (opens in new window)

Author(s): Santiago Arranz Olmos , Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe, Tiago Oliveira, Peter Schwabe
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2024-1, 2023, Page(s) 375-397, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2024.i1.375-397

Single-Trace Attacks on Keccak

Author(s): Matthias J. Kannwischer, Peter Pessl, Robert Primas
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Issue 2020 Issue 3, 2020, Page(s) to appear, ISSN 2569-2925
Publisher: Ruhr University Bochum

Formally verifying Kyber -- Episode IV: Implementation correctness (opens in new window)

Author(s): José Bacelar Almeida, Universidade do Minho, INESC TEC Manuel Barbosa, University of Porto (FCUP), INESC TEC Gilles Barthe, Max Planck Institute for Security and Privacy, IMDEA Software Benjamin Grégoire, Université Côte dAzur, French Institute for Research in Computer Science and Automation Vincent Laporte, Université de Lorraine, French National Centre for Scientific Research, French Instit
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2023-3, 2023, Page(s) 164-193, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2023.i3.164-193

Systematic Side-Channel Analysis of Curve25519 with Machine Learning (opens in new window)

Author(s): Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
Published in: Journal of Hardware and Systems Security, Issue 4/4, 2020, Page(s) 314-328, ISSN 2509-3428
Publisher: Springer Nature
DOI: 10.1007/s41635-020-00106-w

Fault Injection as an Oscilloscope: Fault Correlation Analysis (opens in new window)

Author(s): Albert Spruyt, Alyssa Milburn, Łukasz Chmielewski
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 192-216, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2021.i1.192-216

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning (opens in new window)

Author(s): Guilherme Perin, Łukasz Chmielewski, Lejla Batina, Stjepan Picek
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 343-372, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2021.i1.343-372

Post Quantum Noise (opens in new window)

Author(s): Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber
Published in: CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Publisher: ACM
DOI: 10.1145/3548606.3560577

Improving Software Quality in Cryptography Standardization Projects (opens in new window)

Author(s): Matthias J. Kannwischer; Peter Schwabe; Douglas Stebila; Thom Wiggers
Published in: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2022, Page(s) 19-30
Publisher: IEEE
DOI: 10.1109/eurospw55150.2022.00010

Typing High-Speed Cryptography against Spectre v1 (opens in new window)

Author(s): Basavesh Ammanaghatta Shivakumar , Gilles Barthe, Benjamin Grégoire , Vincent Laporte , Tiago Oliveira, Swarn Priya , Peter Schwabe , Lucas Tabary-Maujean
Published in: 2023 IEEE Symposium on Security and Privacy (SP), 2023, Page(s) 1094-1111
Publisher: IEEE
DOI: 10.1109/sp46215.2023.10179418

TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android (opens in new window)

Author(s): Dimitri Mankowski; Thom Wiggers; Veelasha Moonsamy
Published in: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2023, Page(s) 526-538
Publisher: IEEE
DOI: 10.1109/eurospw59978.2023.00065

KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip (opens in new window)

Author(s): Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
Published in: Applied Cryptography and Network Security, Issue LNCS 13269, 2022, Page(s) 253–272
Publisher: Springer
DOI: 10.1007/978-3-031-09234-3_13

Post-Quantum TLS Without Handshake Signatures (opens in new window)

Author(s): Peter Schwabe, Douglas Stebila, Thom Wiggers
Published in: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, Page(s) 1461-1480, ISBN 9781450370899
Publisher: ACM
DOI: 10.1145/3372297.3423350

High-Assurance Cryptography Software in the Spectre Era (opens in new window)

Author(s): Gilles Barthem Sunjay Cauligi, Benjamin Gregoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
Published in: 2021 IEEE Symposium on Security and Privacy (SP), 2021, Page(s) 788-805
Publisher: IEEE Computer Society
DOI: 10.1109/sp40001.2021.00046

A tale of two models: formal verification of KEMTLS via Tamarin (opens in new window)

Author(s): Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers,
Published in: Computer Security – ESORICS 2022, Issue LNCS13556, 2022, Page(s) 63–83
Publisher: Springer
DOI: 10.1007/978-3-031-17143-7_4

Formally verifying Kyber -- Episode V: End-to-end machine-checked IND-CCA securityand correctness of ML-KEM in EasyCrypt

Author(s): José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, and Pierre-Yves Strub
Published in: Advances in Cryptology -- CRYPTO 2024, 2024
Publisher: Springer

“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks (opens in new window)

Author(s): Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar
Published in: 2022 IEEE Symposium on Security and Privacy (SP), 2021
Publisher: IEEE
DOI: 10.1109/sp46214.2022.9833713

Post-Quantum Multi-Recipient Public Key Encryption (opens in new window)

Author(s): Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe,
Published in: CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, Page(s) 1108–1122
Publisher: ACM
DOI: 10.1145/3576915.3623185

"""These results must be false"": A usability evaluation of constant-time analysis tools"

Author(s): Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
Published in: Proceedings of the 33rd USENIX Security Symposium, 2024
Publisher: USENIX

Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem (opens in new window)

Author(s): Lars Ran, Simona Samardjiska, Monika Trimoska
Published in: Code-Based Cryptography, Issue LNCS 14311, 2023, Page(s) 84–103
Publisher: Springer
DOI: 10.1007/978-3-031-46495-9_5

swoosh: efficient lattice-based non-interactive key exchange

Author(s): Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
Published in: Proceedings of the 33rd USENIX Security Symposium, 2024
Publisher: USENIX

Take your MEDS: Digital Signatures from Matrix Code Equivalence (opens in new window)

Author(s): Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska,
Published in: Progress in Cryptology - AFRICACRYPT 2023, Issue LNCS14064, 2023, Page(s) 28–52
Publisher: Springer
DOI: 10.1007/978-3-031-37679-5_2

KEMTLS vs. Post-Quantum TLS: Performance On Embedded Systems (opens in new window)

Author(s): Ruben Gonzalez, Thom Wiggers
Published in: Security, Privacy, and Applied Cryptography Engineering, Issue LNCS 13783, 2022, Page(s) 99–117
Publisher: Springer
DOI: 10.1007/978-3-031-22829-2

The SPHINCS + Signature Framework (opens in new window)

Author(s): Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 2129-2146, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3363229

pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4

Author(s): Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen
Published in: Workshop Record of the Second PQC Standardization Conference, 2019
Publisher: Second PQC Standardization Conference

Spectre Declassified: Reading from the Right Place at the Wrong Time (opens in new window)

Author(s): Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O’Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom
Published in: 2023 IEEE Symposium on Security and Privacy (SP), 2023, Page(s) 1753-1770
Publisher: IEEE
DOI: 10.1109/sp46215.2023.10179355

Faster Kyber and Dilithium on the Cortex-M4 (opens in new window)

Author(s): Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
Published in: Applied Cryptography and Network Security, Issue LNCS 13269, 2022, Page(s) 853–871
Publisher: Springer
DOI: 10.1007/978-3-031-09234-3_42

Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code (opens in new window)

Author(s): Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
Published in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, Page(s) 685-699, ISBN 9781450384544
Publisher: ACM
DOI: 10.1145/3460120.3485380

Practically Solving LPN (opens in new window)

Author(s): Thom Wiggers, Simona Samardjiska
Published in: 2021 IEEE International Symposium on Information Theory (ISIT), 2021, Page(s) 2399-2404, ISBN 978-1-5386-8209-8
Publisher: IEEE
DOI: 10.1109/isit45174.2021.9518109

Ultimate SLH: Taking Speculative Load Hardening to the Next Level

Author(s): Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom,
Published in: Proceedings of the 32nd USENIX Security Symposium, 2023, Page(s) 7125-7142
Publisher: USENIX

Post-quantum WireGuard (opens in new window)

Author(s): Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann
Published in: 2021 IEEE Symposium on Security and Privacy (SP), 2021, Page(s) 511-528
Publisher: IEEE Computer Society
DOI: 10.1109/sp40001.2021.00030

Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks (opens in new window)

Author(s): Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stottinger
Published in: 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2020, Page(s) 57-65, ISBN 978-1-7281-9562-9
Publisher: IEEE Computer Society
DOI: 10.1109/fdtc51366.2020.00015

Implementing and Measuring KEMTLS (opens in new window)

Author(s): Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
Published in: Progress in Cryptology – LATINCRYPT 2021, Issue LNCS, volume 12912, 2021, Page(s) 88-107
Publisher: Springer
DOI: 10.1007/978-3-030-88238-9_5

More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys (opens in new window)

Author(s): Peter Schwabe, Douglas Stebila, Thom Wiggers
Published in: Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I, Issue 12972, 2021, Page(s) 3-22, ISBN 978-3-030-88417-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-88418-5_1

Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the “Classic McEliece” Hardware Reference Implementation (opens in new window)

Author(s): Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, Issue 12491, 2020, Page(s) 881-910, ISBN 978-3-030-64836-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64837-4_29

Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 (opens in new window)

Author(s): Leon Botros, Matthias J. Kannwischer, Peter Schwabe
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 209-228, ISBN 978-3-030-23695-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-23696-0_11

Faster Multiplication in $$\mathbb {Z}_{2^m}[x]$$ on Cortex-M4 to Speed up NIST PQC Candidates (opens in new window)

Author(s): Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
Published in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Issue 11464, 2019, Page(s) 281-301, ISBN 978-3-030-21567-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-21568-2_14

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages (opens in new window)

Author(s): Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Issue 11923, 2019, Page(s) 285-314, ISBN 978-3-030-34617-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-34618-8_10

A Reaction Attack Against Cryptosystems Based on LRPC Codes (opens in new window)

Author(s): Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
Published in: Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings, Issue 11774, 2019, Page(s) 197-216, ISBN 978-3-030-30529-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-30530-7_10

Assembly or Optimized C for Lightweight Cryptography on RISC-V? (opens in new window)

Author(s): Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Daan Sprenkels, Benoit Viguier
Published in: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, Issue 12579, 2020, Page(s) 526-545, ISBN 978-3-030-65410-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-65411-5_26

Verifying Post-Quantum Signatures in 8 kB of RAM (opens in new window)

Author(s): Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
Published in: Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings, Issue 12841, 2021, Page(s) 215-233, ISBN 978-3-030-81292-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-81293-5_12

Post-Quantum TLS

Author(s): Thom Wiggers
Published in: 2024, ISBN 9789464733303
Publisher: Radboud University

Polynomial Multiplication for Post-Quantum Cryptography

Author(s): Kannwischer, M.J.
Published in: 2022
Publisher: Radboud University

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0