A decade of lattice cryptography
C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Lattice-based cryptographic primitives are believed to offer resilience against attacks by
quantum computers. We demonstrate the practicality of post-quantum key exchange by …
quantum computers. We demonstrate the practicality of post-quantum key exchange by …
Lattice cryptography for the internet
C Peikert - International workshop on post-quantum cryptography, 2014 - Springer
In recent years, lattice-based cryptography has been recognized for its many attractive
properties, such as strong provable security guarantees and apparent resistance to quantum …
properties, such as strong provable security guarantees and apparent resistance to quantum …
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto - Annual international cryptology conference, 1999 - Springer
This paper shows a generic and simple conversion from weak asymmetric and symmetric
encryption schemes into an asymmetric encryption scheme which is secure in a very strong …
encryption schemes into an asymmetric encryption scheme which is secure in a very strong …
[PDF][PDF] Non-malleable cryptography
The notion of non-malleable cryptography, an extension of semantically secure
cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …
cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE
eliminates the need for a Public Key Infrastructure (PKI). The senders using an IBE do not …
eliminates the need for a Public Key Infrastructure (PKI). The senders using an IBE do not …
Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4
M Anastasova, R Azarderakhsh… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Supersingular Isogeny Key Encapsulation mechanism (SIKE) is the only post-quantum
key encapsulation protocol based on elliptic curves and isogeny maps between them …
key encapsulation protocol based on elliptic curves and isogeny maps between them …
Post-quantum key exchange for the internet and the open quantum safe project
D Stebila, M Mosca - International Conference on Selected Areas in …, 2016 - Springer
Designing public key cryptosystems that resist attacks by quantum computers is an important
area of current cryptographic research and standardization. To retain confidentiality of …
area of current cryptographic research and standardization. To retain confidentiality of …
CCA-secure proxy re-encryption without pairings
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under
Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …
Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …