Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

[PDF][PDF] Status report on the second round of the NIST post-quantum cryptography standardization process

G Alagic, J Alperin-Sheriff, D Apon… - US Department of …, 2020 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
one or more public-key cryptographic algorithms through a public, competition-like process …

{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

The SPHINCS+ Signature Framework

DJ Bernstein, A Hülsing, S Kölbl… - Proceedings of the …, 2019 - dl.acm.org
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has
significant advantages over the state of the art in terms of speed, signature size, and …

Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Implementing Grover oracles for quantum key search on AES and LowMC

S Jaques, M Naehrig, M Roetteler, F Virdia - Advances in Cryptology …, 2020 - Springer
Grover's search algorithm gives a quantum attack against block ciphers by searching for a
key that matches a small number of plaintext-ciphertext pairs. This attack uses O (N) O (N) …

Post-quantum zero-knowledge and signatures from symmetric-key primitives

M Chase, D Derler, S Goldfeder, C Orlandi… - Proceedings of the …, 2017 - dl.acm.org
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …

Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs

T Feneuil, A Joux, M Rivain - Annual International Cryptology Conference, 2022 - Springer
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …