Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019 - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

Benchmarking post-quantum cryptography in TLS

C Paquin, D Stebila, G Tamvada - … , PQCrypto 2020, Paris, France, April 15 …, 2020 - Springer
Post-quantum cryptographic primitives have a range of trade-offs compared to traditional
public key algorithms, either having slower computation or larger public keys and …

Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

I Damgård, C Orlandi, A Takahashi, M Tibouchi - Journal of Cryptology, 2022 - Springer
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …

Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications

R Yang, MH Au, Z Zhang, Q Xu, Z Yu… - Advances in Cryptology …, 2019 - Springer
We provide new zero-knowledge argument of knowledge systems that work directly for a
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …

A Comprehensive Survey on Post-Quantum TLS

N Alnahawi, J Müller, J Oupický… - IACR Communications …, 2024 - inria.hal.science
Transport Layer Security (TLS) is the backbone security protocol of the Internet. As this
fundamental protocol is at risk from future quantum attackers, many proposals have been …

Improving the performance of the picnic signature scheme

D Kales, G Zaverucha - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Picnic is a digital signature algorithm designed to provide security against attacks by
quantum computers. The design uses only symmetric-key primitives, and is an efficient …

ModFalcon: Compact signatures based on module-NTRU lattices

C Chuengsatiansup, T Prest, D Stehlé… - Proceedings of the 15th …, 2020 - dl.acm.org
Lattices lead to promising practical post-quantum digital signatures, combining asymptotic
efficiency with strong theoretical security guarantees. However, tuning their parameters into …

Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication 1

S Paul, P Scheible, F Wiemer - Journal of Computer Security, 2022 - content.iospress.com
The threat of a cryptographically relevant quantum computer contributes to an increasing
interest in the field of post-quantum cryptography (PQC). Compared to existing research …

Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates

P Ravi, MP Jhanwar, J Howe… - Proceedings of the …, 2019 - dl.acm.org
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-
based signature schemes. In particular, we extend the practicality of skip-addition fault …

Practical implementation of ring-SIS/LWE based signature and IBE

P Bert, PA Fouque, A Roux-Langlois, M Sabt - … , FL, USA, April 9-11, 2018 …, 2018 - Springer
Lattice-based signature and Identity-Based Encryption are well-known cryptographic
schemes, and having both efficient and provable secure schemes in the standard model is …