A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling [PDF]
The sampling of polynomials with fixed weight is a procedure required by round-4 Key Encapsulation Mechanisms (KEMs) for Post-Quantum Cryptography (PQC) standardization (BIKE, HQC, McEliece) as well as NTRU, Streamlined NTRU Prime, and NTRU LPRrime ...
Georg Land +3 more
core
Доведення без розголошення на основі криптосистем, стійкість яких базується на задачах навчання з помилками [PDF]
Метою дипломної роботи є доведення без розголошення для криптосистем, стiйкiсть яких базується на задачах навчання з помилками, що забезпечить якiсне використання таких структур у криптографiї.
Тузовська, Марія Андріївна
core
Quantum Key Search for Ternary LWE [PDF]
Ternary LWE, i.e., LWE with coefficients of the secret and the error vectors taken from $\{-1, 0, 1\}$, is a popular choice among NTRU-type cryptosystems and some signatures schemes like BLISS and GLP.
Alexander May +2 more
core
Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach [PDF]
Quantum computing advances threaten the security of today\u27s public key infrastructure, and have led to the pending standardization of alternative, quantum-resistant key encapsulation and digital signature cryptography schemes.
David Ott +3 more
core
Hybrid post-quantum cryptography in network protocols [PDF]
Tese (doutorado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2023.A segurança de redes é essencial para as comunicações do dia-a-dia.
Giron, Alexandre Augusto
core
Algorithmic Views of Vectorized Polynomial Multipliers -- NTRU [PDF]
The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal communication. In NTRU, polynomial multiplication is one of bottleneck.
Bo-Yin Yang +3 more
core
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH [PDF]
Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those algorithms into standards for communication protocols ...
Christian Paquin +2 more
core
Leaking-Cascade: an Optimal Construction for KEM Hybridization [PDF]
Hybrid post-quantum cryptography is a cautious approach that aims to guard against the threat posed by the quantum computer, through the simultaneous use of Post-Quantum (PQ) and classical (i.e. pre-quantum) cryptosystems, should the post-quantum schemes
Ange Martinelli +2 more
core
Efficient Noncommutative KEMs from Twisted Dihedral Group Ring [PDF]
NTRU schemes have been extensively studied as post-quantum proposals within the category of lattice-based constructions. Numerous designs have been introduced with security assumptions based on the NTRU hard problem; some focused on security, and others ...
Aditi Kar Gangopadhyay +3 more
core
Fault-Injection Attacks against NIST\u27s Post-Quantum Cryptography Round 3 KEM Candidates [PDF]
We investigate __all__ NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and SIKE. All KEM schemes use variants of the Fujisaki-Okamoto transformation, so
Akira Ito +4 more
core

