SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
Montgomery curves and the Montgomery ladder
DJ Bernstein, T Lange - 2017 - research.tue.nl
The Montgomery ladder is a remarkably simple method of computing scalar multiples of
points on a broad class of elliptic curves. This article surveys a wide range of topics related …
points on a broad class of elliptic curves. This article surveys a wide range of topics related …
NTRU prime: reducing attack surface at low cost
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit
special structures of the rings used in those cryptosystems. The same structures are also …
special structures of the rings used in those cryptosystems. The same structures are also …
Evercrypt: A fast, verified, cross-platform cryptographic provider
J Protzenko, B Parno, A Fromherz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present EverCrypt: a comprehensive collection of verified, high-performance
cryptographic functionalities available via a carefully designed API. The API provably …
cryptographic functionalities available via a carefully designed API. The API provably …
[PDF][PDF] NTRU Prime.
Introduced by Hoffstein–Pipher–Silverman in 1998. Security related to lattice problems; pre-
version cryptanalyzed with LLL by Coppersmith and Shamir. System parameters (p, q), p …
version cryptanalyzed with LLL by Coppersmith and Shamir. System parameters (p, q), p …
Safe curves for elliptic-curve cryptography
DJ Bernstein, T Lange - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Safe curves for elliptic-curve cryptography Page 1 Safe curves for elliptic-curve cryptography
Daniel J. Bernstein1,2 and Tanja Lange3,2 1 University of Illinois at Chicago, USA 2 Academia …
Daniel J. Bernstein1,2 and Tanja Lange3,2 1 University of Illinois at Chicago, USA 2 Academia …
High performance post-quantum key exchange on FPGAs
PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng… - Cryptology ePrint …, 2017 - eprint.iacr.org
Lattice-based cryptography is a highly potential candidate that protects against the threat of
quantum attack. At Usenix Security 2016, Alkim, Ducas, Pöpplemann, and Schwabe …
quantum attack. At Usenix Security 2016, Alkim, Ducas, Pöpplemann, and Schwabe …
Exploring crypto dark matter: New simple PRF candidates and their applications
Pseudorandom functions (PRFs) are one of the fundamental building blocks in
cryptography. Traditionally, there have been two main approaches for PRF design: the …
cryptography. Traditionally, there have been two main approaches for PRF design: the …
High-performance implementation of elliptic curve cryptography using vector instructions
Elliptic curve cryptosystems are considered an efficient alternative to conventional systems
such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used …
such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used …
Highly vectorized SIKE for AVX-512
It is generally accepted that a large-scale quantum computer would be capable to break any
public-key cryptosystem used today, thereby posing a serious threat to the security of the …
public-key cryptosystem used today, thereby posing a serious threat to the security of the …