Resultado final Documents, reports (19) Small devices: Intermediate report on physical attacks This deliverable relates to Task 1.4. This report provides a list with physical attacks that are suitable to attack post-quantum implementations against which implementations need to be validated. It also provides a statement which countermeasures are likely to disable this kind of attacks Cloud: Security risks in public-key cryptography This deliverable is a progress report on Task 3.2. An update of this report will be included in D3.4. Internet: Integration This deliverable concludes Task 2.3. It describes Internet integration of WP2’s software library, and includes a successful example of high-speed high-security post-quantum Internet communication. Cloud: Long-term public-key cryptography This delivearble cludes Task 3.2. It specifies new public-key primitives that are designed to last for 50 years, including a hash-based signature scheme and a code-based encryption scheme. Software implementations will be made publicly available through the Internet. Management: first progeess report year 1 Activity and management report, including reports on external cooperation and on dissemination activities (planned and achieved). Small devices: Final report This deliverable relates to all tasks. It provides all results achieved by the partners in this workpackage and, in particular, a set of security parameters is specified that enable a fair comparison of all implementations. It summarizes recommendations considering the efficient software and hardware implementation of post-quantum algorithms on embedded low-cost devices. In particular, it also includes results and countermeasures obtained from mounting physical attacks against the implementations (Task 1.4). Internet: Preliminary integration This deliverable is a progress report on Task 2.3. It will be superseded by D2.5. Management: second progress report Activity and management report, including reports on external cooperation and on dissemination activities (planned and achieved). Standardization: Final report, The deliverable will conclude the activities undertaken in WP5 and will report on the latest developments and obtained results. Internet: Portfolio This deliverable concludes Task 2.1. It describes the most promising post-quantum systems for Internet applications. Cloud: Advanced applications This deliverable concludes Task 3.3. It evaluates the security of selected protocols. Management: Data management plan Determine which parts of the project will participate in the pilot on open research data and how to organize and manage the data. This deliverable will be updated throughout the lifetime of the project. Cloud: Security risks in secret-key cryptography This deliverable is a progress report on Task 3.1. An update of this report will be included in D3.3. Standardization: Preliminary report The report will cover all ongoing standardization activities and mid-course achievements towards the objectives of WP5. Internet: Preliminary portfolio This deliverable is a progress report on Task 2.1. It will be superseded by D2.3. Small devices: Intermediate report on algorithms This deliverable relates to Task 1.1. It provides a report on (preliminary) studies done by the partners summarizing the main particularities of the state-of-the-art works on post-quantum implementations. Small devices: Intermediate report on optimized hardware, This deliverable relates to Task 1.3. It provides a report the preliminary hardware implementation results of the selected post-quantum schemes and corresponding parameters for embedded systems. Small devices: Intermediate report on optimized software This deliverable relates to Task 1.2. It provides a report the preliminary software implementation results of the selected post-quantum schemes and corresponding parameters for embedded systems. Cloud: Long-term authenticated ciphers This deliverable concludes Task 3.1. It specifies new authenticated ciphers that are designed to last for 50 years. Software implementations will be made publicly available through the Internet. Other (4) Management: Project website and internal IT communication infrastructure Launch of the public project website, internal websites and other IT infrastructure. Internet: Software library, This deliverable concludes Task 2.2.It describes the functionality and use of WP2’s software library for post-quantum cryptography. Small devices: Final implementations This deliverable relates to Tasks 1.2 and 1.3. Software and hardware implementations are delivered and made public together with the corresponding specifications and implementation guidelines. Small devices: Reference implementations This deliverable concludes Task 1.1. Reference implementations of selected post-quantum algorithms are implemented and made public together with the corresponding test vectors. Publicaciones Peer reviewed articles (30) Column Parity Mixers Autores: Stoffelen, Ko; Daemen, Joan Publicado en: IACR Transactions on Symmetric Cryptology, Edición 1, 2018, Página(s) 126-159, ISSN 2519-173X Editor: IACR DOI: 10.13154/tosc.v2018.i1.126-159 Shorter Linear Straight-Line Programs for MDS Matrices Autores: Kranz, Thorsten; Leander, Gregor; Stoffelen, Ko; Wiemer, Friedrich Publicado en: IACR Transactions on Symmetric Cryptology, Edición 4, 2017, ISSN 2519-173X Editor: IACR DOI: 10.13154/tosc.v2017.i4.188-211 Cryptanalysis of GOST2 Autores: Ashur, Tomer; Bar-On, Achiya; Dunkelman, Orr Publicado en: IACR Transactions on Symmetric Cryptology, Edición 8, 2017, ISSN 2519-173X Editor: IACR DOI: 10.13154/tosc.v2017.i1.203-214 Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications Autores: Kölbl, Stefan; Lauridsen, Martin M.; Mendel, Florian; Rechberger, Christian Publicado en: IACR Transactions on Symmetric Cryptology, Edición 5, 2016, ISSN 2519-173X Editor: IACR DOI: 10.13154/tosc.v2016.i2.1-29 Quantum Differential and Linear Cryptanalysis Autores: Kaplan, Marc; Leurent, Gaëtan; Leverrier, Anthony; Naya-Plasencia, María Publicado en: IACR Transactions on Symmetric Cryptology, Edición 9, 2016, ISSN 2519-173X Editor: IACR DOI: 10.13154/tosc.v2016.i1.71-94 Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Autores: Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich Publicado en: IEEE Transactions on Information Theory, Edición 63/1, 2017, Página(s) 404-427, ISSN 0018-9448 Editor: Institute of Electrical and Electronics Engineers DOI: 10.1109/TIT.2016.2574841 Breaching the Privacy of Israel's Paper Ballot Voting System Autores: Ashur, Tomer; Dunkelman, Orr; Talmon, Nimrod Publicado en: Lecture Notes in Computer Science, Edición 6, 2016, ISSN 0302-9743 Editor: Springer Verlag Efficient Slide Attacks Autores: Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller Publicado en: Journal of Cryptology, Edición 31/3, 2018, Página(s) 641-670, ISSN 0933-2790 Editor: Springer Verlag DOI: 10.1007/s00145-017-9266-8 Practical CCA2-Secure and Masked Ring-LWE Implementation Autores: Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu Publicado en: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, ISSN 2569-2925 Editor: Ruhr-University of Bochum DOI: 10.13154/tches.v2018.i1.142-174 How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function? Autores: Shoni Gilboa, Shay Gueron, Ben Morris Publicado en: Journal of Cryptology, Edición 31/1, 2018, Página(s) 162-171, ISSN 0933-2790 Editor: Springer Verlag DOI: 10.1007/s00145-017-9253-0 Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression Autores: Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey Publicado en: Journal of Cryptology, Edición 31/3, 2018, Página(s) 885-916, ISSN 0933-2790 Editor: Springer Verlag DOI: 10.1007/s00145-017-9273-9 CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme Autores: Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé Publicado en: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, ISSN 2569-2925 Editor: Ruhr-University of Bochum DOI: 10.13154/tches.v2018.i1.238-268 Faster Secure Cloud Computations with a Trusted Proxy Autores: Nir Drucker, Shay Gueron, Benny Pinkas Publicado en: IEEE Security & Privacy, Edición 15/6, 2017, Página(s) 61-67, ISSN 1540-7993 Editor: IEEE Computer Society DOI: 10.1109/MSP.2017.4251121 Generalized Gabidulin codes over fields of any characteristic Autores: Daniel Augot, Pierre Loidreau, Gwezheneg Robert Publicado en: Designs, Codes and Cryptography, Edición 86/8, 2018, Página(s) 1807-1848, ISSN 0925-1022 Editor: Kluwer Academic Publishers DOI: 10.1007/s10623-017-0425-6 Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols Autores: Nina Bindel, Johannes Buchmann, Susanne Rieß Publicado en: International Journal of Information Security, 2017, ISSN 1615-5262 Editor: Springer Verlag DOI: 10.1007/s10207-017-0397-6 High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers Autores: Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede Publicado en: ACM Transactions on Embedded Computing Systems, Edición 16/4, 2017, Página(s) 1-24, ISSN 1539-9087 Editor: Association for Computing Machinary, Inc. DOI: 10.1145/3092951 Post-quantum cryptography Autores: Daniel J. Bernstein, Tanja Lange Publicado en: Nature, Edición 549/7671, 2017, Página(s) 188-194, ISSN 0028-0836 Editor: Nature Publishing Group DOI: 10.1038/nature23461 Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes Autores: Alain Couvreur, Irene Marquez-Corbella, Ruud Pellikaan Publicado en: IEEE Transactions on Information Theory, Edición 63/8, 2017, Página(s) 5404-5418, ISSN 0018-9448 Editor: Institute of Electrical and Electronics Engineers DOI: 10.1109/TIT.2017.2712636 Memory Encryption for General-Purpose Processors Autores: Shay Gueron Publicado en: IEEE Security & Privacy, Edición 14/6, 2016, Página(s) 54-62, ISSN 1540-7993 Editor: IEEE Computer Society DOI: 10.1109/MSP.2016.124 Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem Autores: Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt Publicado en: IEEE Transactions on Information Forensics and Security, Edición 11/6, 2016, Página(s) 1093-1105, ISSN 1556-6013 Editor: Institute of Electrical and Electronics Engineers DOI: 10.1109/TIFS.2015.2509944 Masking ring-LWE Autores: Oscar Reparaz, Sujoy Sinha Roy, Ruan de Clercq, Frederik Vercauteren, Ingrid Verbauwhede Publicado en: Journal of Cryptographic Engineering, Edición 6/2, 2016, Página(s) 139-153, ISSN 2190-8508 Editor: Springer Science + Business Media DOI: 10.1007/s13389-016-0126-5 Implementing QC-MDPC McEliece Encryption Autores: Ingo Von Maurich, Tobias Oder, Tim Güneysu Publicado en: ACM Transactions on Embedded Computing Systems, Edición 14/3, 2015, Página(s) 1-27, ISSN 1539-9087 Editor: Association for Computing Machinary, Inc. DOI: 10.1145/2700102 Fast Quicksort Implementation Using AVX Instructions Autores: Shay Gueron, Vlad Krasnov Publicado en: The Computer Journal, 2016, Página(s) bxv063, ISSN 0010-4620 Editor: Oxford University Press DOI: 10.1093/comjnl/bxv063 Structural cryptanalysis of McEliece schemes with compact keys Autores: Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich Publicado en: Designs, Codes and Cryptography, Edición 79/1, 2016, Página(s) 87-112, ISSN 0925-1022 Editor: Kluwer Academic Publishers DOI: 10.1007/s10623-015-0036-z Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups Autores: Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret, Frederic de Portzamparc, Jean-Pierre Tillich Publicado en: IEEE Transactions on Information Theory, Edición 62/1, 2016, Página(s) 184-198, ISSN 0018-9448 Editor: Institute of Electrical and Electronics Engineers DOI: 10.1109/TIT.2015.2493539 Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware Autores: Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann Publicado en: IEEE Transactions on Computers, Edición 64/7, 2015, Página(s) 1954-1967, ISSN 0018-9340 Editor: Institute of Electrical and Electronics Engineers DOI: 10.1109/TC.2014.2346177 Column Parity Mixers Autores: Stoffelen, Ko; Daemen, Joan Publicado en: 2519-173X, Edición 1, 2018, ISSN 2519-173X Editor: IACR DOI: 10.13154/tosc.v2018.i1.126-159 CRYSTALS – Dilithium: Digital Signatures from Module Lattices Autores: Ducas, L.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehle, D. Publicado en: IACR Transactions on Cryptographic Hardware and Embedded System, Edición 1, 2018, Página(s) 238 -- 268, ISSN 2569-2925 Editor: IACR DOI: 10.13154/tches.v2018.i1.238-268 On error distributions in ring-based LWE Autores: Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren Publicado en: LMS Journal of Computation and Mathematics, Edición 19/A, 2016, Página(s) 130-145, ISSN 1461-1570 Editor: London Mathematical Society DOI: 10.1112/S1461157016000280 Computational problems in supersingular elliptic curve isogenies Autores: Steven D. Galbraith, Frederik Vercauteren Publicado en: Quantum Information Processing, Edición 17/10, 2018, ISSN 1570-0755 Editor: Kluwer Academic Publishers DOI: 10.1007/s11128-018-2023-6 Conference proceedings (76) CAKE: Code-based Algorithm for Key Encapsulation Autores: Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich Publicado en: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings, 2017, Página(s) 207-226 Editor: Springer International Publishing DOI: 10.1007/978-3-319-71045-7_11 Statistical decoding Autores: Thomas Debris-Alazard, Jean-Pierre Tillich Publicado en: 2017 IEEE International Symposium on Information Theory (ISIT), 2017, Página(s) 1798-1802, ISBN 978-1-5090-4096-4 Editor: IEEE DOI: 10.1109/ISIT.2017.8006839 Identity-Based Encryption from Codes with Rank Metric Autores: Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich Publicado en: CRYPTO 2017: Advances in Cryptology, 2017, Página(s) 194-224 Editor: Springer International Publishing DOI: 10.1007/978-3-319-63697-9_7 Simpira v2: A Family of Efficient Permutations Using the AES Round Function Autores: Shay Gueron, Nicky Mouha Publicado en: ASIACRYPT 2016: Advances in Cryptology, 2016, Página(s) 95-125 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53887-6_4 Cryptanalysis of the FLIP Family of Stream Ciphers Autores: Sébastien Duval, Virginie Lallemand, Yann Rotella Publicado en: CRYPTO 2016: Advances in Cryptology, 2016, Página(s) 457-475 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53018-4_17 Hypersurfaces in Weighted Projective Spaces Over Finite Fields with Applications to Coding Theory Autores: Yves Aubry, Wouter Castryck, Sudhir R. Ghorpade, Gilles Lachaud, Michael E. O’Sullivan, Samrith Ram Publicado en: Algebraic Geometry for Coding Theory and Cryptography, 2017, Página(s) 25-61 Editor: Springer International Publishing DOI: 10.1007/978-3-319-63931-4_2 Instruction Scheduling and Register Allocation on ARM Cortex-M Autores: Stoffelen, K. Publicado en: SPEED-B - Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, 1 - 9. [S.l. : s.n.], 2016 Editor: ECRYPT-CSA HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction Autores: Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny Publicado en: AFRICACRYPT 2018, 2018, Página(s) 203-216 Editor: Springer International Publishing DOI: 10.1007/978-3-319-89339-6_12 Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs. Autores: Tobias Oder and Tim Güneysu Publicado en: Latincrypt, Edición to appear, 2019 Editor: Springer CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM Autores: Joppe Bos, Leo Ducas, Eike Kiltz, T Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehle Publicado en: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Página(s) 353-367, ISBN 978-1-5386-4228-3 Editor: IEEE DOI: 10.1109/eurosp.2018.00032 Post-quantum authentication in OpenSSL with hash-based signatures Autores: Denis Butin, Julian Walde, Johannes Buchmann Publicado en: 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU), 2017, Página(s) 1-6, ISBN 978-4-907626-31-0 Editor: IEEE DOI: 10.23919/icmu.2017.8330093 Differential Power Analysis of XMSS and SPHINCS Autores: Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann Publicado en: COSADE 2018, 2018, Página(s) 168-188 Editor: Springer International Publishing DOI: 10.1007/978-3-319-89641-0_10 QC-MDPC: A Timing Attack and a CCA2 KEM Autores: Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier Publicado en: PQCrypto 2018, 2018, Página(s) 47-76 Editor: Springer International Publishing DOI: 10.1007/978-3-319-79063-3_3 Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations Autores: Daniel J. Bernstein, Bo-Yin Yang Publicado en: PQCrypto 2018, 2018, Página(s) 487-506 Editor: Springer International Publishing DOI: 10.1007/978-3-319-79063-3_23 Post-quantum security of the sponge construction.. Post-Quantum Cryptography. Autores: Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh Publicado en: PQCrypto 2018, 2018, Página(s) 185-204 Editor: Springer International Publishing DOI: 10.1007/978-3-319-79063-3_9 SOFIA: MQ-based signatures in the QROM Autores: Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe Publicado en: PKC 2018, 2018, Página(s) 3-33 Editor: Springer International Publishing DOI: 10.1007/978-3-319-76581-5_1 Putting Wings on SPHINCS Autores: Stefan Kölbl Publicado en: PQCrypto 2018, 2018, Página(s) 205-226 Editor: Springer International Publishing DOI: 10.1007/978-3-319-79063-3_10 Rounded Gaussians Autores: Andreas Hülsing, Tanja Lange, Kit Smeets Publicado en: PKC 2018, 2018, Página(s) 728-757 Editor: Springer International Publishing DOI: 10.1007/978-3-319-76581-5_25 Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α * q^β Autores: Patrick Holzer, Thomas Wunderer, Johannes A. Buchmann Publicado en: Indocrypt 2017, 2017, Página(s) 346-368 Editor: Springer International Publishing DOI: 10.1007/978-3-319-71667-1_18 Revisiting the Expected Cost of Solving uSVP and Applications to LWE Autores: Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer Publicado en: Asiacrypt 2017, 2017, Página(s) 297-322 Editor: Springer International Publishing DOI: 10.1007/978-3-319-70694-8_11 NTRU prime: reducing attack surface at low cost Autores: Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal Publicado en: SAC 2017, 2018, Página(s) 235-260 Editor: Springer International Publishing DOI: 10.1007/978-3-319-72565-9_12 An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography Autores: André Chailloux, María Naya-Plasencia, André Schrottenloher Publicado en: Asiacrypt 2017, 2017, Página(s) 211-240 Editor: Springer International Publishing DOI: 10.1007/978-3-319-70697-9_8 Lattice Klepto: turning post-quantum crypto against itself Autores: Robin Kwant, Tanja Lange, Kimberley Thissen Publicado en: SAC 2017, 2018, Página(s) 336-354 Editor: Springer International Publishing DOI: 10.1007/978-3-319-72565-9_17 Gimli: a cross-platform permutation Autores: Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier Publicado en: CHES 2017, 2017, Página(s) 299-320 Editor: Springer International Publishing DOI: 10.1007/978-3-319-66787-4_15 """Oops, I did it again"" - Security of One-Time Signatures under Two-Message Attacks" Autores: Leon Groot Bruinderink, Andreas Hülsing Publicado en: SAC 2017, 2018, Página(s) 299-322 Editor: Springer International Publishing DOI: 10.1007/978-3-319-72565-9_15 Sliding Right into Disaster: Left-to-Right Sliding Windows Leak Autores: Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom Publicado en: CHES 2017, 2017, Página(s) 555-576 Editor: Springer International Publishing DOI: 10.1007/978-3-319-66787-4_27 Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Autores: Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber Publicado en: Foundations and Practice of Security, 2017, Página(s) 225-241 Editor: Springer International Publishing DOI: 10.1007/978-3-319-75650-9_15 To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures Autores: Peter Pessl, Leon Groot Bruinderink, Yuval Yarom Publicado en: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Página(s) 1843-1855, ISBN 9781-450349468 Editor: ACM Press DOI: 10.1145/3133956.3134023 Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation Autores: Shay Gueron, Yehuda Lindell Publicado en: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Página(s) 1019-1036, ISBN 9781-450349468 Editor: ACM Press DOI: 10.1145/3133956.3133992 Combining Homomorphic Encryption with Trusted Execution Environment - A Demonstration with Paillier Encryption and SGX Autores: Nir Drucker, Shay Gueron Publicado en: Proceedings of the 2017 International Workshop on Managing Insider Security Threats - MIST '17, 2017, Página(s) 85-88, ISBN 9781-450351775 Editor: ACM Press DOI: 10.1145/3139923.3139933 Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives Autores: Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha Publicado en: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Página(s) 1825-1842, ISBN 9781-450349468 Editor: ACM Press DOI: 10.1145/3133956.3133997 Using Scan Side Channel for Detecting IP Theft Autores: Leonid Azriel, Ran Ginosar, Shay Gueron, Avi Mendelson Publicado en: Proceedings of the Hardware and Architectural Support for Security and Privacy 2016 on - HASP 2016, 2016, Página(s) 1-8, ISBN 9781-450347693 Editor: ACM Press DOI: 10.1145/2948618.2948619 Paillier-encrypted databases with fast aggregated queries Autores: Nir Drucker, Shay Gueron Publicado en: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, Página(s) 848-853, ISBN 978-1-5090-6196-9 Editor: IEEE DOI: 10.1109/CCNC.2017.7983244 High-speed key encapsulation from NTRU. Autores: Andreas Hülsing, Joost Rijneveld, John Schanck, Peter Schwabe Publicado en: CHES 2017, 2017, Página(s) 232-252 Editor: Springer International Publishing DOI: 10.1007/978-3-319-66787-4_12 Short generators without quantum computers: the case of multiquadratics Autores: Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal Publicado en: Eurocrypt 2017, 2017, Página(s) 27-59 Editor: Springer International Publishing DOI: 10.1007/978-3-319-56620-7_2 Boosting Authenticated Encryption Robustness with Minimal Modifications Autores: Tomer Ashur, Orr Dunkelman, Atul Luykx Publicado en: CRYPTO 2017, 2017, Página(s) 3-33 Editor: Springer International Publishing DOI: 10.1007/978-3-319-63697-9_1 Memory-Efficient Algorithms for Finding Needles in Haystacks. Autores: Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir Publicado en: Crypto 2017, 2017, Página(s) 185-206 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53008-5_7 Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency (special session) Autores: Nina Bindel, Juliane Krämer, Johannes Schreiber Publicado en: Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion - CODES '17, 2017, Página(s) 1-3, ISBN 9781-450351850 Editor: ACM Press DOI: 10.1145/3125502.3125546 Post-quantum RSA. Autores: Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta Publicado en: PQCrypto 2017, 2017, Página(s) 311-329 Editor: Springer International Publishing DOI: 10.1007/978-3-319-59879-6_18 Quantum Information Set Decoding Algorithms Autores: Ghazal Kachigar, Jean-Pierre Tillich Publicado en: PQCrypto 2017, 2017, Página(s) 69-89 Editor: Springer International Publishing DOI: 10.1007/978-3-319-59879-6_5 Transitioning to a Quantum-Resistant Public Key Infrastructure Autores: Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila Publicado en: PQCrypto 2017, 2017, Página(s) 384-405 Editor: Springer International Publishing DOI: 10.1007/978-3-319-59879-6_22 A Low-Resource Quantum Factoring Algorithm Autores: Daniel J. Bernstein, Jean-François Biasse, Michele Mosca Publicado en: PQCrypto 2017, 2017, Página(s) 330-346 Editor: Springer International Publishing DOI: 10.1007/978-3-319-59879-6_19 Revisiting TESLA in the quantum random oracle model Autores: Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega Publicado en: PQCrypto 2017, 2017, Página(s) 143-162 Editor: Springer International Publishing DOI: 10.1007/978-3-319-59879-6_9 A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE Autores: Florian Göpfert, Christine van Vredendaal, Thomas Wunderer Publicado en: PQCrypto 2017, 2017, Página(s) 184-202 Editor: Springer International Publishing DOI: 10.1007/978-3-319-59879-6_11 XOR of PRPs in a Quantum World Autores: Bart Mennink, Alan Szepieniec Publicado en: PQCrypto 2017, 2017, Página(s) 367-383 Editor: Springer International Publishing DOI: 10.1007/978-3-319-59879-6_21 Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things Autores: Tim Guneysu, Tobias Oder Publicado en: 2017 18th International Symposium on Quality Electronic Design (ISQED), 2017, Página(s) 319-324, ISBN 978-1-5090-5404-6 Editor: IEEE DOI: 10.1109/ISQED.2017.7918335 A code-based blind signature Autores: Olivier Blazy, Philippe Gaborit, Julien Schrek, Nicolas Sendrier Publicado en: 2017 IEEE International Symposium on Information Theory (ISIT), 2017, Página(s) 2718-2722, ISBN 978-1-5090-4096-4 Editor: IEEE DOI: 10.1109/ISIT.2017.8007023 RingRainbow - An Efficient Multivariate Ring Signature Scheme Autores: Mohamed Saied Emam Mohamed, Albrecht Petzoldt Publicado en: Africacrypt 2017, 2017, Página(s) 3-20 Editor: Springer International Publishing DOI: 10.1007/978-3-319-57339-7_1 Fault Attacks on Encrypted General Purpose Compute Platforms Autores: Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter Publicado en: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17, 2017, Página(s) 197-204, ISBN 9781-450345231 Editor: ACM Press DOI: 10.1145/3029806.3029836 Low-Communication Parallel Quantum Multi-Target Preimage Search Autores: Gustavo Banegas, Daniel J. Bernstein Publicado en: SAC 2017, 2017, Página(s) 325-335 Editor: Springer International Publishing DOI: 10.1007/978-3-319-72565-9_16 Surnaming Schemes, Fast Verification, and Applications to SGX Technology Autores: Dan Boneh, Shay Gueron Publicado en: CT-RSA 2017, 2017, Página(s) 149-164 Editor: Springer International Publishing DOI: 10.1007/978-3-319-52153-4_9 A Practical Multivariate Blind Signature Scheme Autores: Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed Publicado en: Financial Cryptography and Data Security 2017, 2017, Página(s) 437-454 Editor: Springer International Publishing DOI: 10.1007/978-3-319-70972-7_25 Attacking Embedded ECC Implementations Through cmov Side Channels Autores: Erick Nascimento, Łukasz Chmielewski, David Oswald, Peter Schwabe Publicado en: SAC 2016, 2017, Página(s) 99-119 Editor: Springer International Publishing DOI: 10.1007/978-3-319-69453-5_6 Solving binary MQ with Grover's algorithm Autores: Peter Schwabe, Bas Westerbaan Publicado en: SPACE 2016, 2016, Página(s) 303-322 Editor: Springer International Publishing DOI: 10.1007/978-3-319-49445-6_17 Fast Arithmetic Modulo 2^x p^y ± 1 Autores: Joppe W. Bos, Simon Friedberger Publicado en: 2017 IEEE 24th Symposium on Computer Arithmetic (ARITH), 2017, Página(s) 148-155, ISBN 978-1-5386-1965-0 Editor: IEEE DOI: 10.1109/ARITH.2017.15 Attacks on Encrypted Memory and Constructions for Memory Protection Autores: Shay Gueron Publicado en: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Edición FDTC 2016, 2016, Página(s) 1-3, ISBN 978-1-5090-1108-7 Editor: IEEE DOI: 10.1109/FDTC.2016.20 Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks Autores: Nina Bindel, Johannes Buchmann, Juliane Kramer Publicado en: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016, Página(s) 63-77, ISBN 978-1-5090-1108-7 Editor: IEEE DOI: 10.1109/FDTC.2016.11 An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation Autores: Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson Publicado en: Africacrypt 2016, 2016, Página(s) 44-60 Editor: Springer International Publishing DOI: 10.1007/978-3-319-31517-1_3 Creating Cryptographic Challenges Using Multi-Party Computation - The LWE Challenge Autores: Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter Publicado en: Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography - AsiaPKC '16, 2016, Página(s) 11-20, ISBN 9781-450342865 Editor: ACM Press DOI: 10.1145/2898420.2898422 On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Autores: Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer Publicado en: Africacrypt 2016, 2016, Página(s) 24-43 Editor: Springer International Publishing DOI: 10.1007/978-3-319-31517-1_2 Frodo - Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE Autores: Joppe Bos, Craig Costello, Leo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila Publicado en: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Página(s) 1006-1018, ISBN 9781-450341394 Editor: ACM Press DOI: 10.1145/2976749.2978425 Worst case QC-MDPC decoder for McEliece cryptosystem Autores: Julia Chaulet, Nicolas Sendrier Publicado en: 2016 IEEE International Symposium on Information Theory (ISIT), 2016, Página(s) 1366-1370, ISBN 978-1-5090-1806-2 Editor: IEEE DOI: 10.1109/ISIT.2016.7541522 Enhancing the Scalability and Memory Usage of Hashsieve on Multi-core CPUs Autores: Artur Mariano, Christian Bischof Publicado en: 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), 2016, Página(s) 545-552, ISBN 978-1-4673-8776-7 Editor: IEEE DOI: 10.1109/PDP.2016.31 GCM-SIV - Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Autores: Shay Gueron, Yehuda Lindell Publicado en: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Página(s) 109-119, ISBN 9781-450338325 Editor: ACM Press DOI: 10.1145/2810103.2813613 Fast Garbling of Circuits Under Standard Assumptions Autores: Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas Publicado en: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Página(s) 567-578, ISBN 9781-450338325 Editor: ACM Press DOI: 10.1145/2810103.2813619 High-Performance and Lightweight Lattice-Based Public-Key Encryption Autores: Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann Publicado en: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS '16, 2016, Página(s) 2-9, ISBN 9781-450342834 Editor: ACM Press DOI: 10.1145/2899007.2899011 Information sets of Multiplicity codes Autores: Daniel Augot, Francoise Levy-dit-Vehel, Cuong M. Ngo Publicado en: 2015 IEEE International Symposium on Information Theory (ISIT), 2015, Página(s) 2401-2405, ISBN 978-1-4673-7704-1 Editor: IEEE DOI: 10.1109/ISIT.2015.7282886 New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem Autores: Adrien Hauteville, Jean-Pierre Tillich Publicado en: 2015 IEEE International Symposium on Information Theory (ISIT), 2015, Página(s) 2747-2751, ISBN 978-1-4673-7704-1 Editor: IEEE DOI: 10.1109/ISIT.2015.7282956 Post-quantum Key Exchange -- A New Hope Autores: Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe Publicado en: 25th USENIX Security Symposium (USENIX Security 16), 2016 Editor: USENIX Association Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP Autores: Artur Mariano, Christian Bischof, Thijs Laarhoven Publicado en: 2015 44th International Conference on Parallel Processing, 2015, Página(s) 590-599, ISBN 978-1-4673-7587-0 Editor: IEEE DOI: 10.1109/ICPP.2015.68 Using Reed-Solomon codes in the (U | U + V ) construction and an application to cryptography Autores: Irene Marquez-Corbella, Jean-Pierre Tillich Publicado en: 2016 IEEE International Symposium on Information Theory (ISIT), 2016, Página(s) 930-934, ISBN 978-1-5090-1806-2 Editor: IEEE DOI: 10.1109/ISIT.2016.7541435 A new hope on ARM Cortex-M Autores: Alkim, E.; Jakubeit, P.; Schwabe, P.; Carlet, C.; Hasan, A.; Saraswat, V. Publicado en: Security, Privacy, and Applied Cryptography Engineering. SPACE 2016. Lecture Notes in Computer Science, Edición 10076, 2016, Página(s) 332-349, ISBN 978-3-319-49445-6 Editor: Springer DOI: 10.1007/978-3-319-49445-6_19 A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded Encoding Schemes Autores: Albrecht, M.; Bai, S.; Ducas, Léo; Robshaw, M.; Katz, J. Publicado en: Advances in Cryptology – CRYPTO 2016, Lecture Notes in Computer Science, Edición 9814, 2016, Página(s) 153-178, ISBN 978-3-662-53018-4 Editor: Springer DOI: 10.1007/978-3-662-53018-4_6 All the AES You Need on Cortex-M3 and M4 Autores: Schwabe, P.; Stoffelen, K.; Avanzi, R.; Heys, H. Publicado en: Selected Areas in Cryptography – SAC 2016, Lecture notes in computer science, Edición 10532, 2017, Página(s) 180 - 194, ISBN 978-3-319-69452-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-69453-5_10 Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies Autores: Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny Publicado en: Eurocrypt 2019, lecture notes in computer science, 2019 Editor: Springer Post-quantum key exchange – a new hope Autores: Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. Publicado en: 25th USENIX Security Symposium, 2016, Página(s) 327--343, ISBN 978-1-931971-32-4 Editor: USENIX Association Other (7) The Advantage of Truncated Permutations Autores: Gilboa, Shoni; Gueron, Shay Publicado en: 2016 Editor: arXiv The decoding failure probability of MDPC codes Autores: Tillich, Jean-Pierre Publicado en: 2018 Editor: arXiv BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation Autores: Bardet , Magali; Barelli , Elise; Blazy , Olivier; Canto Torres , Rodolfo; Couvreur , Alain; Gaborit , Philippe; Otmani , Ayoub; Sendrier , Nicolas; Tillich , Jean-Pierre Publicado en: submission to the NIST post quantum cryptography standardization process. 2017, 2017 Editor: INRIA BIKE: Bit Flipping Key Encapsulation Autores: Aragon , Nicolas; Barreto , Paulo ,; Bettaieb , Slim; Bidoux , Loïc; Blazy , Olivier; Deneuville , Jean-Christophe; Gaborit , Philippe; Gueron , Shay; Guneysu , Tim; Aguilar Melchor , Carlos; Misoczki , Rafael; Persichetti , Edoardo; Sendrier , Nicolas; Tillich , Jean-Pierre; Zémor , Gilles Publicado en: https://hal.archives-ouvertes.fr/hal-01671903, 2017 Editor: INRIA XMSS: eXtended Merkle Signature Scheme Autores: A. Huelsing D. Butin S. Gazdag J. Rijneveld A. Mohaisen Publicado en: RFC, Edición 8391, 2018 Editor: IRTF DOI: 10.17487/RFC8391 Towards KEM Unification Autores: Daniel J. Bernstein and Edoardo Persichetti Publicado en: IACR ePrint archive, Edición 2018/526, 2018 Editor: IACR Is the security of quantum cryptography guaranteed by the laws of physics? Autores: Daniel J. Bernstein Publicado en: quant-ph arXiv, Edición 1803.04520, 2018 Editor: online Book chapters (27) RankSynd a PRNG Based on Rank Metric Autores: Philippe Gaborit, Adrien Hauteville, Jean-Pierre Tillich Publicado en: Post-Quantum Cryptography, 2016, Página(s) 18-28, ISBN 978-3-319-29360-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-29360-8_2 Optimizing S-Box Implementations for Several Criteria Using SAT Solvers Autores: Ko Stoffelen Publicado en: Fast Software Encryption, 2016, Página(s) 140-160, ISBN 978-3-662-52993-5 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-52993-5_8 IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter Autores: Ingo von Maurich, Lukas Heberle, Tim Güneysu Publicado en: Post-Quantum Cryptography, 2016, Página(s) 1-17, ISBN 978-3-319-29360-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-29360-8_1 Provably Weak Instances of Ring-LWE Revisited Autores: Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren Publicado en: Advances in Cryptology – EUROCRYPT 2016, 2016, Página(s) 147-167, ISBN 978-3-662-49890-3 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-49890-3_6 Analysis of Information Set Decoding for a Sub-linear Error Weight Autores: Rodolfo Canto Torres, Nicolas Sendrier Publicado en: Post-Quantum Cryptography, 2016, Página(s) 144-161, ISBN 978-3-319-29360-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-29360-8_10 Differential Power Analysis of a McEliece Cryptosystem Autores: Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt Publicado en: Applied Cryptography and Network Security, 2015, Página(s) 538-556, ISBN 978-3-319-28166-7 Editor: Springer International Publishing DOI: 10.1007/978-3-319-28166-7_26 Mitigating Multi-target Attacks in Hash-Based Signatures Autores: Andreas Hülsing, Joost Rijneveld, Fang Song Publicado en: Public-Key Cryptography – PKC 2016, 2016, Página(s) 387-416, ISBN 978-3-662-49384-7 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-49384-7_15 ARMed SPHINCS Autores: Andreas Hülsing, Joost Rijneveld, Peter Schwabe Publicado en: Public-Key Cryptography – PKC 2016, 2016, Página(s) 446-470, ISBN 978-3-662-49384-7 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-49384-7_17 A Masked Ring-LWE Implementation Autores: Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede Publicado en: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Página(s) 683-702, ISBN 978-3-662-48324-4 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-48324-4_34 Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes Autores: Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich Publicado en: Post-Quantum Cryptography, 2016, Página(s) 118-143, ISBN 978-3-319-29360-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-29360-8_9 Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression Autores: Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey Publicado en: Fast Software Encryption, 2016, Página(s) 313-333, ISBN 978-3-662-52993-5 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-52993-5_16 An Efficient Attack on a Code-Based Signature Scheme Autores: Aurélie Phesso, Jean-Pierre Tillich Publicado en: Post-Quantum Cryptography, 2016, Página(s) 86-103, ISBN 978-3-319-29360-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-29360-8_7 Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems Autores: Alan Szepieniec, Jintai Ding, Bart Preneel Publicado en: Post-Quantum Cryptography, 2016, Página(s) 182-196, ISBN 978-3-319-29360-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-29360-8_12 Additively Homomorphic Ring-LWE Masking Autores: Oscar Reparaz, Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede Publicado en: Post-Quantum Cryptography, 2016, Página(s) 233-244, ISBN 978-3-319-29360-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-29360-8_15 Speeding up R-LWE Post-quantum Key Exchange Autores: Shay Gueron, Fabian Schlieker Publicado en: Secure IT Systems, 2016, Página(s) 187-198, ISBN 978-3-319-47560-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-47560-8_12 Semantic Security and Indistinguishability in the Quantum World Autores: Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner Publicado en: Advances in Cryptology – CRYPTO 2016, 2016, Página(s) 60-89, ISBN 978-3-662-53015-3 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53015-3_3 Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme Autores: Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom Publicado en: Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Página(s) 323-345, ISBN 978-3-662-53140-2 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53140-2_16 Design Principles for HFEv- Based Multivariate Signature Schemes Autores: Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding Publicado en: Advances in Cryptology -- ASIACRYPT 2015, 2015, Página(s) 311-334, ISBN 978-3-662-48797-6 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-48797-6_14 High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers Autores: Thomas Pöppelmann, Tobias Oder, Tim Güneysu Publicado en: Progress in Cryptology -- LATINCRYPT 2015, 2015, Página(s) 346-365, ISBN 978-3-319-22174-8 Editor: Springer International Publishing DOI: 10.1007/978-3-319-22174-8_19 Arithmetic Addition over Boolean Masking Autores: Tobias Schneider, Amir Moradi, Tim Güneysu Publicado en: Applied Cryptography and Network Security, 2015, Página(s) 559-578, ISBN 978-3-319-28166-7 Editor: Springer International Publishing DOI: 10.1007/978-3-319-28166-7_27 Masking Large Keys in Hardware: A Masked Implementation of McEliece Autores: Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt Publicado en: Selected Areas in Cryptography – SAC 2015, 2016, Página(s) 293-309, ISBN 978-3-319-31301-6 Editor: Springer International Publishing DOI: 10.1007/978-3-319-31301-6_18 Breaking Symmetric Cryptosystems Using Quantum Period Finding Autores: Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia Publicado en: Advances in Cryptology – CRYPTO 2016, 2016, Página(s) 207-237, ISBN 978-3-662-53008-5 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53008-5_8 QcBits: Constant-Time Small-Key Code-Based Cryptography Autores: Tung Chou Publicado en: Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Página(s) 280-300, ISBN 978-3-662-53140-2 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53140-2_14 MQSAS - A Multivariate Sequential Aggregate Signature Scheme Autores: Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt Publicado en: Information Security, 2016, Página(s) 426-439, ISBN 978-3-319-45871-7 Editor: Springer International Publishing DOI: 10.1007/978-3-319-45871-7_25 The Shortest Signatures Ever Autores: Mohamed Saied Emam Mohamed, Albrecht Petzoldt Publicado en: Progress in Cryptology – INDOCRYPT 2016, 2016, Página(s) 61-77, ISBN 978-3-319-49890-4 Editor: Springer International Publishing DOI: 10.1007/978-3-319-49890-4_4 From 5-Pass $$\mathcal {MQ}$$ -Based Identification to $$\mathcal {MQ}$$ -Based Signatures Autores: Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe Publicado en: Advances in Cryptology – ASIACRYPT 2016, Edición 10032, 2016, Página(s) 135-165, ISBN 978-3-662-53889-0 Editor: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53890-6_5 CSIDH: An Efficient Post-Quantum Commutative Group Action Autores: Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes Publicado en: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Edición 11274, 2018, Página(s) 395-427, ISBN 978-3-030-03331-6 Editor: Springer International Publishing DOI: 10.1007/978-3-030-03332-3_15 Buscando datos de OpenAIRE... Se ha producido un error en la búsqueda de datos de OpenAIRE No hay resultados disponibles