Conceptual review on number theoretic transform and comprehensive review on its implementations
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become
increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic …
increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic …
[PDF][PDF] Falcon: Fast-Fourier lattice-based compact signatures over NTRU
PA Fouque, J Hoffstein, P Kirchner… - Submission to the NIST's …, 2018 - di.ens.fr
This document is the supporting documentation of Falcon. It is organized as follows. Chapter
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …
Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
Quantum computing technologies pose a significant threat to the currently employed public-
key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …
key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …
Post-quantum TLS without handshake signatures
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …
Oil and vinegar: Modern parameters and implementations
Two multivariate digital signature schemes, Rainbow and GeMSS, made it into the third
round of the NIST PQC competition. However, neither made its way to being a standard due …
round of the NIST PQC competition. However, neither made its way to being a standard due …
Estimate all the {LWE, NTRU} schemes!
We consider all LWE-and NTRU-based encryption, key encapsulation, and digital signature
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …
Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head
We present a new method for transforming zero-knowledge protocols in the designated
verifier setting into public-coin protocols, which can be made non-interactive and publicly …
verifier setting into public-coin protocols, which can be made non-interactive and publicly …
Benchmarking post-quantum cryptography in TLS
Post-quantum cryptographic primitives have a range of trade-offs compared to traditional
public key algorithms, either having slower computation or larger public keys and …
public key algorithms, either having slower computation or larger public keys and …
Efficient lifting for shorter zero-knowledge proofs and post-quantum signatures
D Kales, G Zaverucha - Cryptology ePrint Archive, 2022 - eprint.iacr.org
MPC-in-the-head based zero-knowledge proofs allow one to prove knowledge of a
preimage for a circuit defined over a finite field F. In recent proofs the soundness depends …
preimage for a circuit defined over a finite field F. In recent proofs the soundness depends …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …