Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
[PDF][PDF] Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon… - US Department of …, 2020 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
one or more public-key cryptographic algorithms through a public, competition-like process …
one or more public-key cryptographic algorithms through a public, competition-like process …
{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
The SPHINCS+ Signature Framework
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has
significant advantages over the state of the art in terms of speed, signature size, and …
significant advantages over the state of the art in terms of speed, signature size, and …
Poseidon: A new hash function for {Zero-Knowledge} proof systems
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …
Bulletproofs, is seeing a very dynamic development with several constructions having …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Implementing Grover oracles for quantum key search on AES and LowMC
Grover's search algorithm gives a quantum attack against block ciphers by searching for a
key that matches a small number of plaintext-ciphertext pairs. This attack uses O (N) O (N) …
key that matches a small number of plaintext-ciphertext pairs. This attack uses O (N) O (N) …
Post-quantum zero-knowledge and signatures from symmetric-key primitives
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …
security entirely from the security of symmetric-key primitives, believed to be quantum …
Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …
ongoing effort to build a quantum computer urges the cryptography community to develop …