Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model [PDF]
The recent post-quantum cryptography standardization project launched by NIST increased the interest in generic key encapsulation mechanism (KEM) constructions in the quantum random oracle (QROM).
A Hülsing +17 more
core +1 more source
Аналіз актуальних проблемних питань щодо перспективної асиметричної криптографії [PDF]
Наведений аналіз актуальних досліджень щодо криптографії на решітках. Аналіз відбувається відповідно до найбільш актуальних алгоритмів, що пройшли до другого етапу конкурсу NIST США. Деякі з них комбіновані — включають в себе декілька схожих алгоритмів з
Акользіна, О.С. +2 more
core +3 more sources
A Comparison of NTRU Variants [PDF]
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on ...
John M. Schanck
core
Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM [PDF]
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalists and ...
Aydin Aysu, Emre Karabulut, Erdem Alkim
core
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication [PDF]
The threat of a cryptographically relevant quantum computer contributes to an increasing interest in the field of post-quantum cryptography (PQC). Compared to existing research efforts regarding the integration of PQC into the Transport Layer Security ...
D Micciancio +9 more
core +1 more source
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber [PDF]
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to improve the sample complexity (i.e ...
Chi Cheng +4 more
core +2 more sources
Quantifying risks in cryptographic selection processes [PDF]
There appears to be a widespread belief that some processes of selecting cryptosystems are less risky than other processes. As a case study of quantifying the difference in risks, this paper compares the currently-known-failure rates of three large ...
Daniel J. Bernstein
core
NIST Post-Quantum Cryptography- A Hardware Evaluation Study [PDF]
Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer attacks.
Deepraj Soni +3 more
core
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme [PDF]
In this paper, we propose NTRU-LPR IND-CPA, a new secure scheme based on the decisional variant of Bounded Distance Decoding problem over rings (DR-BDD). This scheme is IND-CPA secure and has two KEM variants IND-CCA2 secure in the random oracle model.
Bernard Ousmane Sané +3 more
core
An NTRU-Based Key Encapsulation Scheme for Underwater Acoustic Communication
With the increasing emphasis on safeguarding maritime sovereignty and developing marine resources, the security of underwater acoustic communication has risen to a new level of importance.
Peng He, Mingze Xu
semanticscholar +1 more source

