Deliverable, preprints and reprints

The following papers acknowledge support by the PQCRYPTO project. This page will be filled in as the project progresses.

Published papers (most recent first)

  • Achiya Bar-On, Eli Biham, Orr Dunkelman, and Nathan Keller Efficient Slide Attacks Accepted to Journal of Cryptology, Springer, to appear. ePrint preprint
  • Tobias Oder, Tobias Schneider, Thomas Pöppelmann, and Tim Güneysu Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 1, to appear and author copy
  • Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, and Lorenz Panny. HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction. Africacrypt 2018, LNCS 10831, Springer, pp. 203-216. ePrint preprint
  • Tobias Oder and Tim Güneysu. Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs. Latincryypt 2017, to appear and author copy
  • Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehlé. CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM. 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018 (to appear) author copy
  • Denis Butin, Julian Wälde, and Johannes Buchmann. Post-Quantum Authentication in OpenSSL with Hash-Based Signatures Tenth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), 2017, IEEE, to appear. author copy
  • Matthias J. Kannwischer, Aymeric Genet, Denis Butin, Juliane Krämer, and Johannes Buchmann. Differential Power Analysis of XMSS and SPHINCS COSADE, 2018, to appear. author copy
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrede Lepoint, Maria Naya-Plasencia, Pascal Paillier, and Renaud Sirdey. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression Journal of Cryptology, Springer Verlag, 2018. HAL open archive
  • Shoni Gilboa, Shay Gueron, and Ben Morris. How many queries are needed to distinguish a truncated random permutation from a random function? J. Cryptology, vol. 31, no. 1, pp. 162:171, 2018. author copy ArXive preprint
  • Edward Eaton, Matthieu Lequesne, Alex Parent, and Nicolas Sendrier. QC-MDPC: A Timing Attack and a CCA2 KEM PQCrypto 2018. LNCS 10786, pp. 47-76, Springer, 2018 ePrint preprint
  • Daniel J. Bernstein, Bo-Yin Yang. Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations. PQCrypto 2018. LNCS 10786, pp. 487-506, Springer, 2018. author copy
  • Stefan Kölbl Putting Wings on SPHINCS. PQCrypto 2018. LNCS 10786, pp. 205-226. ePrint preprint
  • Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, and Dominique Unruh. Post-quantum security of the sponge construction.. Post-Quantum Cryptography. PQCrypto 2018. LNCS 10786, pp 185-204. Presented at QCRYPT 2017. ePrint preprint
  • Andreas Hülsing, Tanja Lange, Kit Smeets Rounded Gaussians. Public-Key Cryptography - PKC 2018, LNCS 10769, pp.728-757, Springer, 2018 ePrint preprint
  • Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska and Peter Schwabe. SOFIA: MQ-based signatures in the QROM. Public Key Cryptography – ublic-Key Cryptography - PKC 2018, LNCS 10770, pp.3-33, Springer-Verlag (2018). author copy
  • Léo Ducas, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé. CRYSTALS – Dilithium: Digital Signatures from Module Lattices. Transactions on Cryptographic Hardware and Embedded Systems, Volume 2018-1, Ruhr University Bochum (2018), pp 238–268. author copy
  • Paulo S. L. M. Barreto, Shay Gueron, Tim G¨neysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich. CAKE: code-based algorithm for key encapsulation, in Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings, 2017, pp. 207:226. author copy ePrint preprint
  • Patrick Holzer and Thomas Wunderer. Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α * q^β. INDOCRYPT, 2017, LNCS 10698, Springer. pp 346-368 ePrint preprint
  • Martin R. Albrecht, Florian Göpfert, Fernando Virdia, and Thomas Wunderer. Revisiting the Expected Cost of Solving uSVP and Applications to LWE ASIACRYPT, 2017, LNCS 10624, Springer, pp 297--322 author copy
  • Andre Chailloux, Maria Naya-Plasencia, and Andre Schrottenloher. An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography Asiacrypt 2017, LNCS 10625, pp. 211-240, Springer, 2017. HAL open archive
  • Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Chrsitine van Vredendaal. NTRU prime: reducing attack surface at low cost. SAC 2017, LNCS 10719, Springer, pp. 235-260. ePrint preprint
  • Robin Kwant, Tanja Lange, and Kimberley Thissen. Lattice Klepto: turning post-quantum crypto against itself. SAC 2017, LNCS 10719, Springer, pp. 336-354. ePrint preprint
  • Leon Groot Bruinderink and Andreas Hülsing. ``Oops, I did it again" - Security of One-Time Signatures under Two-Message Attacks SAC 2017, LNCS 10719, Springer, pp. 299--322 ePrint preprint
  • Gustavo Banegas, Daniel J. Bernstein. Low-Communication Parallel Quantum Multi-Target Preimage Search. SAC 2017, LNCS 10719, Springer, pp. 325-335. author copy
  • Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier. Gimli: a cross-platform permutation. Cryptographic Hardware and Embedded Systems – CHES 2017, Lecture Notes in Computer Science 10529, Springer-Verlag (2017), pp. 299–320. author copy
  • Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, and Yuval Yarom. Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. CHES 2017, Lecture Notes in Computer Science 10529, Springer-Verlag (2017), pp. 555-576 ePrint preprint
  • Nir Drucker, Shay Gueron, Benny Pinkas. Faster secure cloud computations with a trusted proxy, IEEE Security & Privacy, vol. 15, no. 6, pp. 61:67, 2017. author copy
  • Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, and Alexandra Weber. Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Foundations and Practice of Security - 10th International Symposium, 2017, LNCS 10723, Springer, pages 225-241. author copy
  • Daniel Augot, Pierre Loidreau, and Gwezheneg Robert. Generalized Gabidulin Codes over Fields of any Characteristic Designs, Codes and Cryptography, Springer, 2017 arxiv 1703.09125
  • Peter Pessl, Leon Groot Bruinderink and Yuval Yarom To BLISS-B or not to be -- Attacking strongSwan~s Implementation of Post-Quantum Signatures in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 184-1855 ePrint preprint
  • Shay Gueron, Yehuda Lindell. Better bounds for block cipher modes of operation via nonce-based key derivation, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1019-1036. author copy ePrint preprint
  • Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig and Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1825-1842. ePrint preprint
  • Nir Drucker, Shay Gueron. Combining homomorphic encryption with trusted execution environment: A demonstration with Paillier encryption and SGX, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 85:88. author copy
  • Leonid Azriel, Ran Ginosar, Shay Gueron, and Avi Mendelson. Using scan side channel to detect IP theft, IEEE Trans. VLSI Syst., vol. 25, no. 12, pp. 3268:3280, 2017. author copy
  • Nina Bindel, Johannes Buchmann, Susanne Rieß. Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols. International Journal of Information Security, 2017, Springer, pages 1-18 author copy
  • Nir Drucker and Shay Gueron. Paillier-encrypted databases with fast aggregated queries, in 14th IEEE Annual Consumer Communications & Networking Conference, CCNC 2017, Las Vegas, NV, USA, January 8-11, 2017, 2017, pp. 848:853. author copy
  • Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, and Ingrid Verbauwhede . High-Performance Ideal Lattice-Based Cryptography on 8-bit AVR Microcontrollers. ACM Transactions on Embedded Computing Systems (TECS), Volume 16 Issue 4, September 2017 Article No. 117, ACM, 24 pages and author copy
  • Andreas Hülsing, Joost Rijneveld, John Schanck, and Peter Schwabe. High-speed key encapsulation from NTRU. Cryptographic Hardware and Embedded Systems – CHES 2017 Lecture Notes in Computer Science 10529, Springer-Verlag (2017), pp 232–252. author copy
  • Daniel J. Bernstein and Tanja Lange. Post-quantum cryptography. Nature, 549(7671), pp 188-194. No free copy for the first few months.
  • Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, and Christine van Vredendaal. Short generators without quantum computers: the case of multiquadratics. Eurocrypt 2017, LNCS 10210, pp 27-59. Springer. ePrint preprint
  • Alain Couvreur, Ayoub Otmani, and Jean-Pierre Tillich. Polynomial Time Attack on Wild McEliece Over Quadratic Extensions IEEE Transactions on Information Theory, 63(1):404-427, IEEE, 2017 HAL open archive
  • Tomer Ashur, Orr Dunkelman, Nimrod Talmon Breaching the Privacy of Israel's Paper Ballot Voting System. E-VOTE-ID 2016 pp. 108-124. arXiv preprint
  • Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, and Jean-Pierre Tillich. Identity-based Encryption from Codes with Rank Metric Crypto 2017, LNCS 10403, pp. 194-224, Springer, 2017. HAL open archive
  • Tomer Ashur, Orr Dunkelman, Atul Luykx Boosting Authenticated Encryption Robustness with Minimal Modifications. CRYPTO 2017, LNCS 10403, pp. 3-33. ePrint preprint
  • Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir: Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO 2016, LNCS 9815, Springer, pages 185-206 ePrint preprint
  • Nina Bindel, Juliane Krämer, Johannes Schreiber. Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency CODES+ISSS, 2017, ACM, pages 8:1-8:3. author copy
  • Alain Couvreur, Irene Marquez-Corbella, and Ruud Pellikaan. Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes IEEE Transactions on Information Theory, 63(8):5404-5418, IEEE, 2017 arxiv 1401.6025
  • Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta. Post-quantum RSA. PQCrypto 2017, LNCS 10346, Springer, pp. 311-329. author copy
  • Daniel J. Bernstein, Jean-Francois Biasse, Michele Mosca. A Low-Resource Quantum Factoring Algorithm. PQCrypto 2017, LNCS 10346, Springer, pp. 330-346. author copy
  • Ghazal Kachigar and Jean-Pierre Tillich. Quantum Information Set Decoding Algorithms PQCrypto 2017, LNCS 10346, Springer, pp. 69-89. HAL open archive
  • Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila. Transitioning to a Quantum-Resistant Public Key Infrastructure. PQCrypto 2017, LNCS 10346, Springer, pp. 384-405. eprint preprint
  • Bart Mennink, Alan Szepieniec XOR of PRPs in a Quantum World. PQCRYPTO 2017, LNCS 10346, Springer, pp. 367-383 ePrint preprint
  • Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega. Revisiting TESLA in the quantum random oracle model PQCrypto 2017, LNCS 10346, Springer, pp. 143-162. author copy
  • Florian G&oum;pfert, Christine van Vredendaal, Thomas Wunderer. A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE. PQCrypto 2017, LNCS 10346, pp. 184-202. eprint preprint
  • Olivier Blazy, Philippe Gaborit, Julien Schrek, and Nicolas Sendrier. A Code-Based Blind Signature ISIT 2017, pp. 2718-2722, IEEE, 2017 HAL open archive
  • Tim Güneysu and Tobias Oder Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things. 18th International Symposium on Quality Electronic Design (ISQED), 2017, IEEE, 319-324 author copy
  • Mohamed Saied Emam Mohamed, Albrecht Petzoldt. RingRainbow - An Efficient Multivariate Ring Signature Scheme. Africacrypto 2017, LNCS 10239, Springer, pp. 3-20. eprint preprint
  • Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter. Fault attacks on encrypted general purpose compute platforms, in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, 2017, pp. 197:204. author copy ArXive preprint
  • Tomer Ashur, Achiya Bar-On, and Orr Dunkelman. Cryptanalysis of GOST2. IACR Trans. Symmetric Cryptol. 2017(1): 203-214 (2017) Open Access version
  • Dan Boneh and Shay Gueron. Surnaming schemes, fast verification, and applications to SGX technology, in Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings, 2017, pp. 149:164. author copy
  • Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed. A Practical Multivariate Blind Signature Scheme. Financial Cryptography and Data Security 2017, LNCS 10322, Springer, pp. 437-454. eprint preprint.
  • Erick Nascimento, Łukasz Chmielewski, David Oswald, and Peter Schwabe. Attacking embedded ECC implementations through cmov side channels. Selected Areas in Cryptology – SAC 2016, Lecture Notes in Computer Science 10532, Springer-Verlag (2017). pp 99–119. author copy
  • Peter Schwabe and Bas Westerbaan. Solving binary MQ with Grover's algorithm. Security, Privacy, and Applied Cryptography Engineering, Lecture Notes in Computer Science 10076, Springer-Verlag (2016), pp 303–322. author copy
  • Shay Gueron. Memory encryption for general-purpose processors, IEEE Security & Privacy, vol. 14, no. 6, pp. 54:62, 2016. author copy
  • Joppe W. Bos and Simon Friedberger Fast Arithmetic Modulo 2^xp^y+- 1 IEEE Symposium on Computer Arithmetic - ARITH-20, pp. 148-155, IEEE Computer Society, 2017. ePrint preprint
  • Mohamed Saied Emam Mohamed, Albrecht Petzoldt. The shortest Signatures Ever INDOCRYPT2016 2017, LNCS 10095 Springer, pp. 61-77 eprint preprint
  • Shay Gueron and Nicky Mouha. Simpira v2: A family of efficient permutations using the AES round function, in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, 2016, pp. 95:125. author copy ePrint preprint
  • Shay Gueron. Attacks on encrypted memory and constructions for memory protection, in 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016, Santa Barbara, CA, USA, August 16, 2016, 2016, pp. 1:3. author copy
  • Rachid El Bansarkhani, Mohamed Saied Emam Mohamed and Albrecht Petzoldt. MQSAS - A Multivariate Sequential Aggregate Signature Scheme. ISC 2016 - The 19th Information Security Conference, LNCS 9866 , Springer, pp. 426-439. eprint preprint
  • Nina Bindel, Johannes Buchmann and Juliane Krämer. Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE, August 2016. eprint preprint
  • Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann. High-Performance and Lightweight Lattice-Based Public-Key Encryption IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM. pp. 2-9. author copy
  • Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, and Michael Walte. Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. ASIAPKC16 - 3rd International Workshop on ASIA Public-Key Cryptography, ACM, pp. 11-20. eprint preprint
  • Stefan Kölbl, Martin M. Lauridsen, Florian Mendel and Christian Rechberger Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Transactions on Symmetric Cryptology, Volume 2016, Issue 2 TOSC
  • Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Kr&uaml;mer, Giorgia Marson. An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation AFRICACRYPT 2016, LNCS 9646, Springer, pp. 44-60. eprint preprint
  • Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer. On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack AFRICACRYPT 2016, LNCS 9646, Springer, pp. 24-43. eprint preprint
  • Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik. Lattice Basis Reduction Attack against Physically Unclonable Functions in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1070-1080.
  • Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, and Peter Schwabe. From 5-pass MQ-based identification to MQ-based signatures. Advances in Cryptology – ASIACRYPT 2016, LNCS, Springer, to appear. author copy
  • Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, and Douglas Stebila. Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE Conference on Computer and Communications Security (ACM CCS) 2016. ePrint preprint
  • Peter Schwabe and Ko Stoffelen. All the AES you need on Cortex-M3 and M4. Selected Areas in Cryptology – SAC 2016, LNCS, Springer, to appear. author copy
  • Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. Post-quantum key exchange – a new hope. USENIX Security Symposium 2016. author copy.
  • Erdem Alkim, Philipp Jakubeit, and Peter Schwabe. A new hope on ARM Cortex-M Security, Privacy, and Applied Cryptography Engineering 2016, LNCS, Springer, to appear. author copy
  • Johannes A. Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, and Thomas Pöppelmann. High-Performance and Lightweight Lattice-Based Public-Key Encryption. IoTPTS at AsiaCCS 2016. author copy.
  • Shay Gueron and Fabian Schlieker. Speeding up R-LWE Post-quantum Key Exchange. Secure IT Systems (NordSec 2016).
  • Irene Márquez-Corbella and Jean-Pierre Tillich. Using Reed-Solomon codes in the $(u|u+v)$ construction and an application to cryptography. ISIT 2016 arxiv 1601.08227.
  • Julia Chaulet and Nicolas Sendrier. Worst case QC-MDPC decoder for McEliece cryptosystem. ISIT 2016 arxiv 1608.06080.
  • Wouter Castryck, Ilia Iliashenko, and Frederik Vercauteren. On the Tightness of the Error Bound in Ring-LWE" to "On Error Distributions in Ring-based LWE. ANTS-XII, LMS Journal of Computation and Mathematics. ePrint preprint
  • Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, and Yuval Yarom. Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme. CHES 2016. ePrint preprint
  • Tung Chou. QcBits: constant-time small-key code-based cryptography. CHES 2016. author copy
  • Erik Boss, Vincent Grosso, Tim GŁneysu, Gregor Leander, Amir Moradi, and Tobias Schneider. Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016. ePrint preprint.
  • Marc Kaplan and Gaëtan Leurent and Anthony Leverrier and María Naya-Plasencia. Breaking Symmetric Cryptosystems using Quantum Period Finding. Crypto 2016. arxiv 1602.05973.
  • Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO 2016. ePrint preprint
  • Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner. Semantic Security and Indistinguishability in the Quantum World. CRYPTO 2016. ePrint preprint
  • Joppe W. Bos, Michael Naehrig, and Joop van de Pol. Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective. To appear in the International Journal of Applied Cryptography. ePrint preprint
  • Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq. Masking Ring-LWE. To appear in Journal of Cryptographic Engineering (special CHES 2015 issue). author copy.
  • Wouter Castryck, Ilia Iliashenko, and Frederik Vercauteren. Provably Weak Instances of Ring-LWE Revisited. EUROCRYPT 2016. ePrint preprint
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression . Fast Software Encryption - FSE 2016, LNCS, Springer, to appear. ePrint preprint.
  • Ko Stoffelen. Optimizing S-box Implementations for Several Criteria using SAT Solvers. Fast Sofware Encryption - FSE 2016. author copy
  • Andreas Hülsing, Joost Rijneveld, and Peter Schwabe. ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM. Public Key Cryptography - PKC 2016. author copy
  • Andreas Hülsing, Joost Rijneveld, and Fang Song. Mitigating Multi-Target Attacks in Hash-based Signatures. Public Key Cryptography - PKC 2016. ePrint preprint
  • Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, and Jean-Pierre Tillich. Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes. PQCrypto 2016, LNCS 9606, pp. 118-143, Springer, 2016. HAL open archive.
  • Rodolfo Canto Torres and Nicolas Sendrier. Analysis of Information Set Decoding for a Sub-linear Error Weight. PQCrypto 2016, LNCS 9606, pp. 144-161, Springer, 2016. HAL open archive.
  • Philippe Gaborit and Adrien Hauteville and Jean-Pierre Tillich. RankSynd a PRNG Based on Rank Metric. PQCrypto 2016, LNCS 9606, pp. 18-28, Springer, 2016. HAL open archive.
  • Alan Szepieniec, Jintai Ding, and Bart Preneel. Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems. PQCrypto 2016. ePrint preprint
  • Aurélie Phesso and Jean-Pierre Tillich. An Efficient Attack on a Code-Based Signature Scheme. PQCrypto 2016, LNCS 9606, pp. 86-103, Springer, 2016. HAL open archive.
  • Ingo von Maurich, Lukas Heberle, and Tim Güneysu. IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. PQCrypto 2016: 1-17 local copy.
  • Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq. Additively Homomorphic Ring-LWE Masking. PQCrypto 2016. author copy.
  • Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich. Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups. IEEE Transactions on Information Theory, vol. 62(1), pp. 184-198, 2016. arxiv 1405.5101.
  • Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich. Structural Cryptanalysis of McEliece Schemes with Compact Keys. DCC (Design, Codes, and Cryptography), vol. 79(1), pp. 87-112, 2016. HAL open archive.
  • Shay Gueron and Vlad Krasnov. Fast Quicksort Implementation Using AVX Instructions. Comput. J. 59(1): 83-90 (2016). official copy.
  • Artur Mariano and Christian Bischof. Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs. PDP2016. author copy
  • Albrecht Petzoldt, Ming-Shing Cheng, Bo-Yin Yang, Tao Chengdong, and Jintai Ding. Design Principles for HFEv- based Signature Scheme. ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, author copy.
  • Daniel Augot and Françoise Levy-dit-Vehel and Man CuongNgô. Information Sets of Multiplicity Codes. ISIT 2015, pp. 2401-2405, IEEE, 2015. arxiv 1509.00279.
  • Adrien Hauteville and Jean-Pierre Tillich. New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem. ISIT 2015, pp. 2747-2751, IEEE, 2015. arxiv 1504.05431.
  • Ingo von Maurich, Tobias Oder, and Tim Güneysu. Implementing QC-MDPC McEliece Encryption. ACM Trans. Embedded Comput. Syst. 14(3): 44 (2015) local copy.
  • Tim Güneysu, Vadim Lyubashevsky, and Thomas Pöppelmann. Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware. IEEE Trans. Computers 64(7): 1954-1967 (2015) author copy.
  • Shay Gueron and Yehuda Lindell. GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. ACM Conference on Computer and Communications Security 2015: 109-119. ePrint preprint
  • Shay Gueron, Yehuda Lindell, Ariel Nof, and Benny Pinkas. Fast Garbling of Circuits Under Standard Assumptions. ACM Conference on Computer and Communications Security 2015: 567-578. ePrint preprint
  • Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, and Ingrid Verbauwhede. A masked ring-LWE implementation. CHES 2015. ePrint preprint
  • Artur Mariano, Thijs Laarhoven, and Christian Bischof. Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing. ePrint preprint
  • Thomas Pöppelmann, Tobias Oder, and Tim Güneysu. High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers. LATINCRYPT 2015: 346-365 ePrint preprint
  • Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt. Masking large keys in hardware: a masked implementation of McEliece. SAC 2015, Sackville, New Brunswick, Canada, August 12-14, 2015. ePrint preprint.
  • Tobias Schneider, Amir Moradi, and Tim Güneysu. Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. ACNS 2015: 559-578 ePrint preprint
  • Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt. Differential Power Analysis of a McEliece Cryptosystem. ACNS 2015: 538-556 author copy.

Preprints and theses (most recent first)

  • Daniel J. Bernstein. Is the security of quantum cryptography guaranteed by the laws of physics? ArXive preprint.
  • Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. NewHope without reconciliation. author copy
  • Nir Drucker and Shay Gueron. A toolbox for software optimization of QC-MDPC code-based cryptosystems, IACR Cryptology ePrint Archive, vol. 2017, p. 1251, 2017. ePrint preprint
  • Andre Chailloux and Thomas Debris-Alazard. A tight security reduction in the quantum random oracle model for code-based signature schemes. Cryptology ePrint Archive, Report 2017/936
  • Nicolas Aragon, Philippe Gaborit, Adrien Hauteville, and Jean-Pierre Tillich. Improvement of Generic Attacks on the Rank Syndrome Decoding Problem preprint 2017 HAL open archive
  • Shay Gueron and Nicky Mouha. Sphincs-simpira: Fast stateless hash-based signatures with post-quantum security. ePrint preprint
  • Thomas Debris-Alazard, Nicolas Sendrier, and Jean-Pierre Tillich. The problem with the SURF scheme preprint 2017 Cryptology ePrint Archive, Report 2017/662
  • Daniel J. Bernstein and Tanja Lange. Post-quantum cryptography: dealing with the fallout of physics success. ePrint preprint
  • Shay Gueron, Adam Langley, and Yehuda Lindell. AES-GCM-SIV: specification and analysis. ePrint preprint
  • Shoni Gilboa and Shay Gueron, The advantage of truncated permutations, CoRR, vol. abs/1610.02518, 2016. ArXive preprint
  • Shay Gueron. A memory encryption engine suitable for general purpose processors, IACR Cryptology ePrint Archive, vol. 2016, p. 204, 2016. ePrint preprint
  • Tomer Ashur, Achiya Bar-On, Orr Dunkelman Cryptanalysis of GOST2. IACR Trans. Symmetric Cryptol. 2017(1), pp. 203-214 (2017) ePrint preprint
  • Shoni Gilboa and Shay Gueron. Distinguishing a truncated random permutation from a random function, IACR Cryptology ePrint Archive, vol. 2015, p. 773, 2015. ePrint preprint
  • Accelerating Pre- and Post-Quantum Cryptography. PhD thesis Tung Chou. author copy.
  • Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, and Peter Schwabe. TESLA: Tightly-secure efficient signatures from standard lattices. author copy
  • Ko Stoffelen. Instruction Scheduling and Register Allocation on ARM Cortex-M. appeared at SPEED-B. workshop handout
  • Tomer Ashur, Achiya Bar-On, Orr Dunkelman. Cryptanalysis of GOST2. ePrint preprint
  • Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vreedendaal. NTRU Prime. ePrint preprint
  • Daniel J. Bernstein. Is the security of quantum cryptography guaranteed by the laws of physics?. author copy
  • Shay Gueron and Nicky Mouha. Simpira v2: A Family of Efficient Permutations Using the AES Round Function. ePrint preprint
  • Leon Groot Bruinderink. Towards Post-Quantum Bitcoin -- Side-Channel Analysis of Bimodal Lattice Signatures. Master Thesis.
  • Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan. Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes. Preprint 2016. arxiv 1401.6025.
  • Marc Kaplan and Gaëtan Leurent and Anthony Leverrier and María Naya-Plasencia. Quantum Differential and Linear Cryptanalysis. Preprint 2016. arxiv 1510.05836.
  • Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, and Christian Rechberger. Haraka - Efficient Short-Input Hashing for Post-Quantum Applications ePrint preprint
  • Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich. Polynomial Time Attack on Wild McEliece Over Quadratic Extensions. Preprint 2015. arxiv 1402.3264.
  • Ming-Shing Chen, Daniel Smith-Tone, and Bo-Yin Yang. PFLASH - Secure Asymmetric Signatures on Smartcards. NIST workshop copy.
Scientific deliverables
D1.1
Intermediate report on algorithms.
D1.2
Reference implementations.
D1.3
Intermediate report on optimized software.
D1.4
Intermediate report on optimized hardware.
D1.5
Intermediate report on physical attacks .
D1.6
Final implementations.
library pqm4
library pqhw
D1.7
Final report.
D2.1
Preliminary portfolio.
D2.2
Preliminary integration.
D2.3
Portfolio.
D2.4
Software library.
libpqcrypto, software library
D2.5
Integration.
D3.1
Security risks in secret-key cryptography
D3.2
Security risks in public-key cryptography
D3.3
Long-term authenticated ciphers.
D3.4
Long-term public-key cryptography.
D3.5
Advanced applications.
D5.1
Standardization: Preliminary report.
D5.2
Final report.



Last modified: 2018.07.17