SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Montgomery curves and the Montgomery ladder

DJ Bernstein, T Lange - 2017 - research.tue.nl
The Montgomery ladder is a remarkably simple method of computing scalar multiples of
points on a broad class of elliptic curves. This article surveys a wide range of topics related …

NTRU prime: reducing attack surface at low cost

DJ Bernstein, C Chuengsatiansup, T Lange… - Selected Areas in …, 2018 - Springer
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit
special structures of the rings used in those cryptosystems. The same structures are also …

Evercrypt: A fast, verified, cross-platform cryptographic provider

J Protzenko, B Parno, A Fromherz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present EverCrypt: a comprehensive collection of verified, high-performance
cryptographic functionalities available via a carefully designed API. The API provably …

[PDF][PDF] NTRU Prime.

DJ Bernstein, C Chuengsatiansup, T Lange… - IACR Cryptol. ePrint …, 2016 - hyperelliptic.org
Introduced by Hoffstein–Pipher–Silverman in 1998. Security related to lattice problems; pre-
version cryptanalyzed with LLL by Coppersmith and Shamir. System parameters (p, q), p …

Safe curves for elliptic-curve cryptography

DJ Bernstein, T Lange - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Safe curves for elliptic-curve cryptography Page 1 Safe curves for elliptic-curve cryptography
Daniel J. Bernstein1,2 and Tanja Lange3,2 1 University of Illinois at Chicago, USA 2 Academia …

High performance post-quantum key exchange on FPGAs

PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng… - Cryptology ePrint …, 2017 - eprint.iacr.org
Lattice-based cryptography is a highly potential candidate that protects against the threat of
quantum attack. At Usenix Security 2016, Alkim, Ducas, Pöpplemann, and Schwabe …

Exploring crypto dark matter: New simple PRF candidates and their applications

D Boneh, Y Ishai, A Passelègue, A Sahai… - Theory of Cryptography …, 2018 - Springer
Pseudorandom functions (PRFs) are one of the fundamental building blocks in
cryptography. Traditionally, there have been two main approaches for PRF design: the …

High-performance implementation of elliptic curve cryptography using vector instructions

A Faz-Hernández, J López, R Dahab - ACM Transactions on …, 2019 - dl.acm.org
Elliptic curve cryptosystems are considered an efficient alternative to conventional systems
such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used …

Highly vectorized SIKE for AVX-512

H Cheng, G Fotiadis, J Großschädl… - IACR Transactions on …, 2022 - tosc.iacr.org
It is generally accepted that a large-scale quantum computer would be capable to break any
public-key cryptosystem used today, thereby posing a serious threat to the security of the …