A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019 - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

JW Bos, C Costello, M Naehrig… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
Lattice-based cryptographic primitives are believed to offer resilience against attacks by
quantum computers. We demonstrate the practicality of post-quantum key exchange by …

Lattice cryptography for the internet

C Peikert - International workshop on post-quantum cryptography, 2014 - Springer
In recent years, lattice-based cryptography has been recognized for its many attractive
properties, such as strong provable security guarantees and apparent resistance to quantum …

Secure integration of asymmetric and symmetric encryption schemes

E Fujisaki, T Okamoto - Annual international cryptology conference, 1999 - Springer
This paper shows a generic and simple conversion from weak asymmetric and symmetric
encryption schemes into an asymmetric encryption scheme which is secure in a very strong …

[PDF][PDF] Non-malleable cryptography

D Dolev, C Dwork, M Naor - Proceedings of the twenty-third annual ACM …, 1991 - dl.acm.org
The notion of non-malleable cryptography, an extension of semantically secure
cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …

Identity-based encryption with efficient revocation

A Boldyreva, V Goyal, V Kumar - … of the 15th ACM conference on …, 2008 - dl.acm.org
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE
eliminates the need for a Public Key Infrastructure (PKI). The senders using an IBE do not …

Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4

M Anastasova, R Azarderakhsh… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Supersingular Isogeny Key Encapsulation mechanism (SIKE) is the only post-quantum
key encapsulation protocol based on elliptic curves and isogeny maps between them …

Post-quantum key exchange for the internet and the open quantum safe project

D Stebila, M Mosca - International Conference on Selected Areas in …, 2016 - Springer
Designing public key cryptosystems that resist attacks by quantum computers is an important
area of current cryptographic research and standardization. To retain confidentiality of …

CCA-secure proxy re-encryption without pairings

J Shao, Z Cao - International Workshop on Public Key Cryptography, 2009 - Springer
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under
Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …