Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
Benchmarking post-quantum cryptography in TLS
Post-quantum cryptographic primitives have a range of trade-offs compared to traditional
public key algorithms, either having slower computation or larger public keys and …
public key algorithms, either having slower computation or larger public keys and …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
We provide new zero-knowledge argument of knowledge systems that work directly for a
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …
A Comprehensive Survey on Post-Quantum TLS
N Alnahawi, J Müller, J Oupický… - IACR Communications …, 2024 - inria.hal.science
Transport Layer Security (TLS) is the backbone security protocol of the Internet. As this
fundamental protocol is at risk from future quantum attackers, many proposals have been …
fundamental protocol is at risk from future quantum attackers, many proposals have been …
Improving the performance of the picnic signature scheme
D Kales, G Zaverucha - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Picnic is a digital signature algorithm designed to provide security against attacks by
quantum computers. The design uses only symmetric-key primitives, and is an efficient …
quantum computers. The design uses only symmetric-key primitives, and is an efficient …
ModFalcon: Compact signatures based on module-NTRU lattices
Lattices lead to promising practical post-quantum digital signatures, combining asymptotic
efficiency with strong theoretical security guarantees. However, tuning their parameters into …
efficiency with strong theoretical security guarantees. However, tuning their parameters into …
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication 1
The threat of a cryptographically relevant quantum computer contributes to an increasing
interest in the field of post-quantum cryptography (PQC). Compared to existing research …
interest in the field of post-quantum cryptography (PQC). Compared to existing research …
Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-
based signature schemes. In particular, we extend the practicality of skip-addition fault …
based signature schemes. In particular, we extend the practicality of skip-addition fault …
Practical implementation of ring-SIS/LWE based signature and IBE
Lattice-based signature and Identity-Based Encryption are well-known cryptographic
schemes, and having both efficient and provable secure schemes in the standard model is …
schemes, and having both efficient and provable secure schemes in the standard model is …