Post-quantum cryptography for long-term security
PQCRYPTO ICT-645622
Technical work packages
Results
Events
Boards
Contact
|
Deliverable, preprints and reprints
The following papers acknowledge support by the PQCRYPTO project.
This page will be filled in as the project progresses.
Published papers (most recent first)
-
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny.
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies.
to appear at Eurocrypt 2019.
ePrint preprint
-
Ko Stoffelen and Joan Daemen.
Column Parity Mixers.
IACR Transactions on Symmetric Cryptology, 2018(1), 126-159.
Open Access at ToSC,
-
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes.
CSIDH: An Efficient Post-Quantum Commutative Group Action.
In ASIACRYPT. LNCS 11274, springer, pp. 395-427.
ePrint preprint
-
Steven D. Galbraith Frederik Vercauteren.
Computational problems in supersingular elliptic curve isogenies.
Quantum Inf Process (2018) 17:265.
ePrint preprint
-
Achiya Bar-On, Eli Biham, Orr Dunkelman, and Nathan Keller
Efficient Slide Attacks Accepted to Journal of Cryptology,
vol. 31/3, pp. 641-670, Springer, 2018. ePrint preprint
-
Tobias Oder, Tobias Schneider, Thomas Pöppelmann, and Tim Güneysu
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR
Transactions on Cryptographic Hardware and Embedded Systems (TCHES),
Volume 2018, Issue 1
TCHES open access,
RUB archivey
-
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, and Lorenz Panny.
HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction. Africacrypt 2018, LNCS 10831, Springer, pp. 203-216.
ePrint preprint
-
Tobias Oder and Tim Güneysu. Implementing the NewHope-Simple Key
Exchange on Low-Cost FPGAs. Latincryypt 2017, to appear RUB repository
-
Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint,
Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and
Damien Stehlé. CRYSTALS – Kyber: a CCA-secure
module-lattice-based KEM. 2018 IEEE European Symposium on Security
and Privacy, EuroS&P 2018.
ePrint preprint,
author
copy
-
Denis Butin, Julian Wälde, and Johannes Buchmann. Post-Quantum
Authentication in OpenSSL with Hash-Based Signatures Tenth
International Conference on Mobile Computing and Ubiquitous Networking
(ICMU), 2017, IEEE.
TUD repository,
author
copy
-
Matthias J. Kannwischer, Aymeric Genet, Denis Butin, Juliane
Krämer, and Johannes Buchmann. Differential Power Analysis of
XMSS and SPHINCS COSADE, 2018, to appear.
ePrint preprint,
author copy
-
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrede Lepoint,
Maria Naya-Plasencia, Pascal Paillier, and Renaud Sirdey. Stream
Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext
Compression Journal of Cryptology, Springer Verlag, 2018. HAL open archive
-
Shoni Gilboa, Shay Gueron, and Ben Morris. How many queries are
needed to distinguish a truncated random permutation from a random
function? J. Cryptology, vol. 31, no. 1, pp. 162:171, 2018.
ArXive preprint,
author copy
-
Edward Eaton, Matthieu Lequesne, Alex Parent, and Nicolas Sendrier.
QC-MDPC: A Timing Attack and a CCA2 KEM
PQCrypto 2018. LNCS 10786, pp. 47-76, Springer, 2018
ePrint preprint
-
Daniel J. Bernstein, Bo-Yin Yang.
Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations.
PQCrypto 2018. LNCS 10786, pp. 487-506, Springer, 2018.
ePrint preprint,
author copy
-
Stefan Kölbl Putting Wings on SPHINCS. PQCrypto 2018. LNCS
10786, pp. 205-226. ePrint
preprint
-
Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian
Schaffner, and Dominique Unruh. Post-quantum security of the
sponge construction.. Post-Quantum Cryptography. PQCrypto
2018. LNCS 10786, pp 185-204. Presented at QCRYPT 2017. ePrint preprint
-
Andreas Hülsing, Tanja Lange, Kit Smeets Rounded
Gaussians. Public-Key Cryptography - PKC 2018,
LNCS 10769, pp.728-757, Springer, 2018 ePrint preprint
-
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska
and Peter Schwabe. SOFIA: MQ-based signatures in the QROM.
Public Key Cryptography – ublic-Key Cryptography - PKC 2018,
LNCS 10770, pp.3-33, Springer-Verlag (2018).
ePrint preprint,
author
copy
-
Léo Ducas, Tancrède Lepoint, Vadim Lyubashevsky, Peter
Schwabe, Gregor Seiler, and Damien Stehlé. CRYSTALS –
Dilithium: Digital Signatures from Module Lattices. Transactions
on Cryptographic Hardware and Embedded Systems, Volume 2018-1, Ruhr
University Bochum (2018), pp 238–268.
ePrint preprint,
author
copy
-
Paulo S. L. M. Barreto, Shay Gueron, Tim G¨neysu, Rafael Misoczki,
Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich. CAKE:
code-based algorithm for key encapsulation, in Cryptography and
Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK,
December 12-14, 2017, Proceedings, 2017, pp. 207:226.
ePrint preprint,
author copy.
-
Patrick Holzer and Thomas Wunderer.
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor
p^α * q^β.
INDOCRYPT, 2017, LNCS 10698, Springer. pp 346-368
ePrint preprint
-
Martin R. Albrecht, Florian Göpfert, Fernando Virdia, and Thomas Wunderer.
Revisiting the Expected Cost of Solving uSVP and Applications to LWE
ASIACRYPT, 2017, LNCS 10624, Springer, pp 297--322
ePrint preprint,
author
copy
-
Andre Chailloux, Maria Naya-Plasencia, and Andre Schrottenloher.
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography
Asiacrypt 2017, LNCS 10625, pp. 211-240, Springer, 2017.
HAL open archive
-
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange,
and Chrsitine van Vredendaal.
NTRU prime: reducing attack surface at low cost.
SAC 2017, LNCS 10719, Springer, pp. 235-260.
ePrint preprint
-
Robin Kwant, Tanja Lange, and Kimberley Thissen.
Lattice Klepto: turning post-quantum crypto against itself.
SAC 2017, LNCS 10719, Springer, pp. 336-354.
ePrint preprint
-
Leon Groot Bruinderink and Andreas Hülsing. ``Oops, I did it
again" - Security of One-Time Signatures under Two-Message Attacks
SAC 2017, LNCS 10719, Springer, pp. 299--322 ePrint preprint
-
Gustavo Banegas, Daniel J. Bernstein.
Low-Communication Parallel Quantum Multi-Target Preimage Search.
SAC 2017, LNCS 10719, Springer, pp. 325-335.
ePrint preprint,
author copy
-
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa
Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter
Schwabe, François-Xavier Standaert, Yosuke Todo, and
Benoît Viguier. Gimli: a cross-platform permutation.
Cryptographic Hardware and Embedded Systems – CHES 2017, Lecture
Notes in Computer Science 10529, Springer-Verlag (2017), pp.
299–320.
ePrint preprint,
author
copy
-
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot
Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal,
and Yuval Yarom. Sliding Right into Disaster: Left-to-Right
Sliding Windows Leak. CHES 2017, Lecture Notes in Computer Science
10529, Springer-Verlag (2017), pp. 555-576 ePrint preprint
-
Nir Drucker, Shay Gueron, Benny Pinkas. Faster secure cloud
computations with a trusted proxy, IEEE Security & Privacy,
vol. 15, no. 6, pp. 61:67, 2017.
author copy at UH repository,
author
copy
-
Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel,
Johannes Schickel, and Alexandra Weber. Bounding the
cache-side-channel leakage of lattice-based signature schemes using
program semantics Foundations and Practice of Security - 10th
International Symposium, 2017, LNCS 10723, Springer, pages 225-241.
ePrint preprint,
author
copy
-
Daniel Augot, Pierre Loidreau, and Gwezheneg Robert.
Generalized Gabidulin Codes over Fields of any Characteristic
Designs, Codes and Cryptography, Springer, 2017
arxiv 1703.09125
-
Peter Pessl, Leon Groot Bruinderink and Yuval Yarom To BLISS-B or
not to be -- Attacking strongSwan~s Implementation of Post-Quantum
Signatures in Proceedings of the 2017 ACM SIGSAC Conference on
Computer and Communications Security, CCS 2017, Dallas, TX, USA,
October 30 - November 03, 2017, 2017, pp. 184-1855 ePrint preprint
-
Shay Gueron, Yehuda Lindell. Better bounds for block cipher modes
of operation via nonce-based key derivation, in Proceedings of the
2017 ACM SIGSAC Conference on Computer and Communications Security,
CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp.
1019-1036.
ePrint preprint,
author
copy .
-
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi,
Sebastian Ramacher, Christian Rechberger, Daniel Slamanig and Greg
Zaverucha. Post-Quantum Zero-Knowledge and Signatures from
Symmetric-Key Primitives. in Proceedings of the 2017 ACM SIGSAC
Conference on Computer and Communications Security, CCS 2017, Dallas,
TX, USA, October 30 - November 03, 2017, 2017, pp. 1825-1842. ePrint preprint
-
Nir Drucker, Shay Gueron. Combining homomorphic encryption with
trusted execution environment: A demonstration with Paillier
encryption and SGX, in Proceedings of the 2017 International
Workshop on Managing Insider Security Threats, Dallas, TX, USA,
October 30 - November 03, 2017, 2017, pp. 85:88.
UH repository,
author
copy
-
Leonid Azriel, Ran Ginosar, Shay Gueron, and Avi Mendelson. Using
scan side channel to detect IP theft, IEEE Trans. VLSI Syst.,
vol. 25, no. 12, pp. 3268:3280, 2017.
Technion server,
author
copy
-
Nina Bindel, Johannes Buchmann, Susanne Rieß. Comparing
apples with apples: performance analysis of lattice-based
authenticated key exchange protocols. International Journal of
Information Security, 2017, Springer, pages 1-18
TUD repository,
author
copy
-
Nir Drucker and Shay Gueron. Paillier-encrypted databases with
fast aggregated queries, in 14th IEEE Annual Consumer
Communications & Networking Conference, CCNC 2017, Las Vegas, NV, USA,
January 8-11, 2017, 2017, pp. 848:853.
UH repository,
author
copy
-
Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha
Roy, Tim Güneysu, Johann Großschädl, Howon Kim, and Ingrid Verbauwhede
. High-Performance Ideal Lattice-Based Cryptography on 8-bit AVR
Microcontrollers. ACM Transactions on Embedded Computing Systems
(TECS), Volume 16 Issue 4, September 2017 Article No. 117, ACM, 24
pages RUB repository
-
Andreas Hülsing, Joost Rijneveld, John Schanck, and Peter
Schwabe. High-speed key encapsulation from NTRU. Cryptographic
Hardware and Embedded Systems – CHES 2017 Lecture Notes in
Computer Science 10529, Springer-Verlag (2017), pp 232–252.
eprint preprint,
author
copy
-
Daniel J. Bernstein and Tanja Lange. Post-quantum
cryptography. Nature, 549(7671), pp 188-194.
TUE repository
-
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, and
Christine van Vredendaal. Short generators without quantum
computers: the case of multiquadratics. Eurocrypt 2017, LNCS
10210, pp 27-59. Springer. ePrint preprint
-
Alain Couvreur, Ayoub Otmani, and Jean-Pierre Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
IEEE Transactions on Information Theory, 63(1):404-427, IEEE, 2017
HAL open archive
-
Tomer Ashur, Orr Dunkelman, Nimrod Talmon Breaching the Privacy of
Israel's Paper Ballot Voting System. E-VOTE-ID 2016 pp. 108-124.
arXiv preprint
-
Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, and Jean-Pierre Tillich.
Identity-based Encryption from Codes with Rank Metric
Crypto 2017, LNCS 10403, pp. 194-224, Springer, 2017.
HAL open archive
-
Tomer Ashur, Orr Dunkelman, Atul Luykx Boosting Authenticated
Encryption Robustness with Minimal Modifications. CRYPTO 2017,
LNCS 10403, pp. 3-33. ePrint preprint
-
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks.
CRYPTO 2016, LNCS 9815, Springer, pages 185-206 ePrint preprint
-
Nina Bindel, Juliane Krämer, Johannes Schreiber. Hampering
fault attacks against lattice-based signature schemes: countermeasures
and their efficiency CODES+ISSS, 2017, ACM, pages 8:1-8:3. TUD repository
-
Alain Couvreur, Irene Marquez-Corbella, and Ruud Pellikaan.
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes
IEEE Transactions on Information Theory, 63(8):5404-5418, IEEE, 2017
arxiv 1401.6025
-
Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta.
Post-quantum RSA.
PQCrypto 2017, LNCS 10346, Springer, pp. 311-329.
eprint preprint,
author copy
-
Daniel J. Bernstein, Jean-Francois Biasse, Michele Mosca.
A Low-Resource Quantum Factoring Algorithm.
PQCrypto 2017, LNCS 10346, Springer, pp. 330-346.
eprint preprint,
author copy
-
Ghazal Kachigar and Jean-Pierre Tillich.
Quantum Information Set Decoding Algorithms
PQCrypto 2017, LNCS 10346, Springer, pp. 69-89.
HAL open archive
-
Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila.
Transitioning to a Quantum-Resistant Public Key Infrastructure.
PQCrypto 2017, LNCS 10346, Springer, pp. 384-405.
eprint preprint
-
Bart Mennink, Alan Szepieniec XOR of PRPs in a Quantum World.
PQCRYPTO 2017, LNCS 10346, Springer, pp. 367-383 ePrint preprint
-
Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward
Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega. Revisiting
TESLA in the quantum random oracle model PQCrypto 2017, LNCS
10346, Springer, pp. 143-162.
ePrint preprint,
author
copy
-
Florian Göpfert, Christine van Vredendaal, Thomas Wunderer.
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
PQCrypto 2017, LNCS 10346, pp. 184-202.
eprint preprint
-
Olivier Blazy, Philippe Gaborit, Julien Schrek, and Nicolas Sendrier.
A Code-Based Blind Signature
ISIT 2017, pp. 2718-2722, IEEE, 2017
HAL open archive
-
Tim Güneysu and Tobias Oder Towards lightweight Identity-Based
Encryption for the post-quantum-secure Internet of Things. 18th
International Symposium on Quality Electronic Design (ISQED), 2017,
IEEE, 319-324 RUB repository
-
Mohamed Saied Emam Mohamed, Albrecht Petzoldt.
RingRainbow - An Efficient Multivariate Ring Signature Scheme.
Africacrypto 2017, LNCS 10239, Springer, pp. 3-20.
eprint preprint
-
Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian
Vetter. Fault attacks on encrypted general purpose compute
platforms, in Proceedings of the Seventh ACM on Conference on Data
and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ,
USA, March 22-24, 2017, 2017, pp. 197:204.
ArXive preprint,
author
copy
-
Tomer Ashur, Achiya Bar-On, and Orr Dunkelman. Cryptanalysis of
GOST2. IACR Trans. Symmetric Cryptol. 2017(1): 203-214 (2017) Open
Access at ToSC,
ePrint preprint
-
Dan Boneh and Shay Gueron. Surnaming schemes, fast verification,
and applications to SGX technology, in Topics in Cryptology -
CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017,
San Francisco, CA, USA, February 14-17, 2017, Proceedings, 2017, pp.
149:164.
UH repository,
author
copy
-
Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed. A
Practical Multivariate Blind Signature Scheme. Financial
Cryptography and Data Security 2017, LNCS 10322, Springer,
pp. 437-454.
eprint preprint.
-
Erick Nascimento, Łukasz Chmielewski, David Oswald, and Peter
Schwabe. Attacking embedded ECC implementations through cmov side
channels. Selected Areas in Cryptology – SAC 2016, Lecture
Notes in Computer Science 10532, Springer-Verlag (2017). pp
99–119.
eprint preprint,
author
copy
-
Peter Schwabe and Bas Westerbaan. Solving binary MQ with Grover's
algorithm. Security, Privacy, and Applied Cryptography
Engineering, Lecture Notes in Computer Science 10076, Springer-Verlag
(2016), pp 303–322.
RUN repository,
eprint preprint,
author
copy
-
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, and Rainer Steinwandt.
Horizontal and Vertical Side Channel Analysis of a
McEliece Cryptosystem,
IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1556-6013, 2016.
RUB repository.
-
Shay Gueron. Memory encryption for general-purpose processors,
IEEE Security & Privacy, vol. 14, no. 6, pp. 54:62, 2016.
ePrint preprint,
author
copy
-
Joppe W. Bos and Simon Friedberger Fast Arithmetic Modulo 2^xp^y+- 1
IEEE Symposium on Computer Arithmetic - ARITH-20, pp. 148-155, IEEE
Computer Society, 2017. ePrint preprint
-
Mohamed Saied Emam Mohamed, Albrecht Petzoldt. The shortest
Signatures Ever INDOCRYPT2016 2017, LNCS 10095 Springer, pp. 61-77
eprint preprint
-
Shay Gueron and Nicky Mouha. Simpira v2: A family of efficient
permutations using the AES round function, in Advances in
Cryptology - ASIACRYPT 2016 - 22nd International Conference on the
Theory and Application of Cryptology and Information Security, Hanoi,
Vietnam, December 4-8, 2016, Proceedings, Part I, 2016, pp. 95:125.
ePrint preprint,
author
copy.
-
Shay Gueron. Attacks on encrypted memory and constructions for
memory protection, in 2016 Workshop on Fault Diagnosis and
Tolerance in Cryptography, FDTC 2016, Santa Barbara, CA, USA, August
16, 2016, 2016, pp. 1:3.
UH repository,
author
copy
-
Rachid El Bansarkhani, Mohamed Saied Emam Mohamed and Albrecht
Petzoldt. MQSAS - A Multivariate Sequential Aggregate Signature
Scheme. ISC 2016 - The 19th Information Security Conference, LNCS
9866 , Springer, pp. 426-439. eprint preprint
-
Nina Bindel, Johannes Buchmann and Juliane Krämer.
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE, August 2016.
eprint preprint
-
Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder,
Thomas Pöppelmann. High-Performance and Lightweight Lattice-Based
Public-Key Encryption IoTPTS '16 - 2nd ACM International Workshop
on IoT Privacy, Trust, and Security, ACM. pp. 2-9. RUB archinve
-
Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan
Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim,
Christine van Vredendaal, and Michael Walte. Creating Cryptographic
Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC16 - 3rd International Workshop on ASIA Public-Key
Cryptography, ACM, pp. 11-20.
eprint preprint
-
Stefan Kölbl, Martin M. Lauridsen, Florian Mendel and Christian
Rechberger Haraka v2 - Efficient Short-Input Hashing for
Post-Quantum Applications. IACR Transactions on Symmetric
Cryptology, Volume 2016, Issue 2 TOSC
-
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Kr&uaml;mer,
Giorgia Marson. An Efficient Lattice-Based Signature Scheme with
Provably Secure Instantiation AFRICACRYPT 2016, LNCS 9646,
Springer, pp. 44-60. eprint preprint
-
Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas
Wunderer. On the Hardness of LWE with Binary Error: Revisiting the
Hybrid Lattice-Reduction and Meet-in-the-Middle Attack AFRICACRYPT
2016, LNCS 9646, Springer, pp. 24-43. eprint preprint
-
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska,
and Peter Schwabe.
From 5-pass MQ-based identification to MQ-based signatures.
Advances in Cryptology – ASIACRYPT 2016, LNCS, Springer.
ePrint preprint,
author copy
-
Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig,
Valeria Nikolaenko, Ananth Raghunathan, and Douglas Stebila.
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE
Conference on Computer and Communications Security (ACM CCS) 2016.
ePrint preprint
-
Peter Schwabe and Ko Stoffelen.
All the AES you need on Cortex-M3 and M4.
Selected Areas in Cryptology – SAC 2016, LNCS, Springer.
ePrint preprint,
author copy.
-
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe.
Post-quantum key exchange – a new hope.
USENIX Security Symposium 2016.
ePrint preprint,
author copy.
-
Erdem Alkim, Philipp Jakubeit, and Peter Schwabe.
A new hope on ARM Cortex-M
Security, Privacy, and Applied Cryptography Engineering 2016, LNCS, Springer.
ePrint preprint,
author copy
-
Shay Gueron and Fabian Schlieker.
Speeding up R-LWE Post-quantum Key Exchange.
Secure IT Systems (NordSec 2016).
ePrint preprint.
-
Irene Márquez-Corbella and Jean-Pierre Tillich.
Using Reed-Solomon codes in the $(u|u+v)$ construction and an application to cryptography.
ISIT 2016
arxiv 1601.08227.
-
Julia Chaulet and Nicolas Sendrier.
Worst case QC-MDPC decoder for McEliece cryptosystem.
ISIT 2016
arxiv 1608.06080.
- Wouter Castryck, Ilia Iliashenko, and Frederik Vercauteren.
On the Tightness of the Error Bound in Ring-LWE" to "On Error
Distributions in Ring-based LWE.
ANTS-XII, LMS Journal of Computation and Mathematics.
ePrint preprint
-
Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, and Yuval Yarom.
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme.
CHES 2016.
ePrint preprint
-
Tung Chou.
QcBits: constant-time small-key code-based cryptography.
CHES 2016.
ePrint preprint,
author copy
-
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, and
Tobias Schneider.
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016.
ePrint preprint.
-
Marc Kaplan and Gaëtan Leurent and Anthony Leverrier and María Naya-Plasencia.
Breaking Symmetric Cryptosystems using Quantum Period Finding.
Crypto 2016.
arxiv 1602.05973.
-
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir.
Memory-Efficient Algorithms for Finding Needles in Haystacks.
CRYPTO 2016.
ePrint preprint
-
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner.
Semantic Security and Indistinguishability in the Quantum World.
CRYPTO 2016.
ePrint preprint
-
Joppe W. Bos, Michael Naehrig, and Joop van de Pol.
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective.
To appear in the International Journal of Applied Cryptography.
ePrint preprint
-
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq.
Masking Ring-LWE.
To appear in Journal of Cryptographic Engineering (special CHES 2015 issue).
KU repository,
author copy.
-
Wouter Castryck, Ilia Iliashenko, and Frederik Vercauteren.
Provably Weak Instances of Ring-LWE Revisited.
EUROCRYPT 2016.
ePrint preprint
-
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey.
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression .
Fast Software Encryption - FSE 2016, LNCS, Springer, to appear.
ePrint preprint.
-
Ko Stoffelen.
Optimizing S-box Implementations for Several Criteria using SAT Solvers.
Fast Sofware Encryption - FSE 2016.
ePrint preprint,
author copy
-
Andreas Hülsing, Joost Rijneveld, and Peter Schwabe.
ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM.
Public Key Cryptography - PKC 2016.
ePrint preprint,
author copy
-
Andreas Hülsing, Joost Rijneveld, and Fang Song.
Mitigating Multi-Target Attacks in Hash-based Signatures.
Public Key Cryptography - PKC 2016.
ePrint preprint
-
Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, and Jean-Pierre Tillich.
Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes.
PQCrypto 2016, LNCS 9606, pp. 118-143, Springer, 2016.
HAL open archive.
-
Rodolfo Canto Torres and Nicolas Sendrier.
Analysis of Information Set Decoding for a Sub-linear Error Weight.
PQCrypto 2016, LNCS 9606, pp. 144-161, Springer, 2016.
HAL open archive.
-
Philippe Gaborit and Adrien Hauteville and Jean-Pierre Tillich.
RankSynd a PRNG Based on Rank Metric.
PQCrypto 2016, LNCS 9606, pp. 18-28, Springer, 2016.
HAL open archive.
-
Alan Szepieniec, Jintai Ding, and Bart Preneel.
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems.
PQCrypto 2016.
ePrint preprint
-
Aurélie Phesso and Jean-Pierre Tillich.
An Efficient Attack on a Code-Based Signature Scheme.
PQCrypto 2016, LNCS 9606, pp. 86-103, Springer, 2016.
HAL open archive.
-
Ingo von Maurich, Lukas Heberle, and Tim Güneysu.
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter.
PQCrypto 2016: 1-17
RUB archive.
-
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq.
Additively Homomorphic Ring-LWE Masking.
PQCrypto 2016.
KU repository,
author copy.
-
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich.
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups.
IEEE Transactions on Information Theory, vol. 62(1), pp. 184-198, 2016.
arxiv 1405.5101.
-
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich.
Structural Cryptanalysis of McEliece Schemes with Compact Keys.
DCC (Design, Codes, and Cryptography), vol. 79(1), pp. 87-112, 2016.
HAL open archive.
-
Shay Gueron and Vlad Krasnov.
Fast Quicksort Implementation Using AVX Instructions.
Comput. J. 59(1): 83-90 (2016).
official copy.
-
Artur Mariano and Christian Bischof.
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
PDP2016.
TUD repository
-
Albrecht Petzoldt, Ming-Shing Cheng, Bo-Yin Yang, Tao Chengdong, and Jintai Ding.
Design Principles for HFEv- based Signature Scheme.
ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and
Application of Cryptology and Information Security,
IIS repository.
-
Daniel Augot and Françoise Levy-dit-Vehel and Man CuongNgô.
Information Sets of Multiplicity Codes.
ISIT 2015, pp. 2401-2405, IEEE, 2015.
arxiv 1509.00279.
-
Adrien Hauteville and Jean-Pierre Tillich.
New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem.
ISIT 2015, pp. 2747-2751, IEEE, 2015.
arxiv 1504.05431.
-
Ingo von Maurich, Tobias Oder, and Tim Güneysu.
Implementing QC-MDPC McEliece Encryption.
ACM Trans. Embedded Comput. Syst. 14(3): 44 (2015)
RUB archive.
-
Tim Güneysu, Vadim Lyubashevsky, and Thomas Pöppelmann.
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware.
IEEE Trans. Computers 64(7): 1954-1967 (2015)
RUB achive.
-
Shay Gueron and Yehuda Lindell.
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.
ACM Conference on Computer and Communications Security 2015: 109-119.
ePrint preprint
-
Shay Gueron, Yehuda Lindell, Ariel Nof, and Benny Pinkas.
Fast Garbling of Circuits Under Standard Assumptions.
ACM Conference on Computer and Communications Security 2015: 567-578.
ePrint preprint
-
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, and Ingrid Verbauwhede.
A masked ring-LWE implementation.
CHES 2015.
ePrint preprint
-
Artur Mariano, Thijs Laarhoven, and Christian Bischof.
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
ICPP 2015 - The 44th Annual Conference 2015 International Conference on
Parallel Processing.
ePrint preprint
-
Thomas Pöppelmann, Tobias Oder, and Tim Güneysu.
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers.
LATINCRYPT 2015: 346-365
ePrint preprint
-
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt.
Masking large keys in hardware: a masked
implementation of McEliece.
SAC 2015, Sackville, New Brunswick, Canada, August 12-14, 2015.
ePrint preprint.
-
Tobias Schneider, Amir Moradi, and Tim Güneysu.
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware.
ACNS 2015: 559-578
ePrint preprint
-
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt.
Differential Power Analysis of a McEliece Cryptosystem.
ACNS 2015: 538-556
ePrint preprint,
author copy.
Preprints and theses (most recent first)
- Daniel J. Bernstein.
Is the security of quantum cryptography guaranteed by the laws of physics?
ArXive preprint.
-
Daniel J. Bernstein and Edoardo Persichetti.
Towards KEM Unification.
ePrint preprint.
-
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter
Schwabe. NewHope without reconciliation.
ePrint preprint,
author
copy
-
Nir Drucker and Shay Gueron. A toolbox for software optimization
of QC-MDPC code-based cryptosystems, IACR Cryptology ePrint
Archive, vol. 2017, p. 1251, 2017. ePrint preprint
-
Andre Chailloux and Thomas Debris-Alazard. A tight security
reduction in the quantum random oracle model for code-based signature
schemes. Cryptology ePrint Archive,
Report 2017/936
-
Nicolas Aragon, Philippe Gaborit, Adrien Hauteville, and Jean-Pierre Tillich.
Improvement of Generic Attacks on the Rank Syndrome Decoding Problem
preprint 2017
HAL open archive
-
Shay Gueron and Nicky Mouha. Sphincs-simpira: Fast stateless
hash-based signatures with post-quantum security. ePrint preprint
-
Thomas Debris-Alazard, Nicolas Sendrier, and Jean-Pierre Tillich.
The problem with the SURF scheme
preprint 2017
Cryptology ePrint Archive, Report 2017/662
-
Daniel J. Bernstein and Tanja Lange. Post-quantum cryptography:
dealing with the fallout of physics success. ePrint preprint
-
Shay Gueron, Adam Langley, and Yehuda Lindell.
AES-GCM-SIV: specification and analysis.
ePrint preprint
-
Shoni Gilboa and Shay Gueron, The advantage of truncated
permutations, CoRR, vol. abs/1610.02518, 2016. ArXive preprint
-
Shay Gueron. A memory encryption engine suitable for general
purpose processors, IACR Cryptology ePrint Archive, vol. 2016, p.
204, 2016. ePrint
preprint
-
Shoni Gilboa and Shay Gueron. Distinguishing a truncated random
permutation from a random function, IACR Cryptology ePrint
Archive, vol. 2015, p. 773, 2015. ePrint preprint
-
Accelerating Pre- and Post-Quantum Cryptography. PhD thesis
Tung Chou.
TUE repository,
author
copy.
- Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür
Dagdelen, and Peter Schwabe. TESLA: Tightly-secure efficient
signatures from standard lattices.
ePrint preprint,
author copy
-
Ko Stoffelen.
Instruction Scheduling and Register Allocation on ARM Cortex-M.
appeared at SPEED-B.
workshop handout
-
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vreedendaal.
NTRU Prime.
ePrint preprint
-
Daniel J. Bernstein.
Is the security of quantum cryptography guaranteed by the laws of physics?.
arXiv preprint,
author copy
-
Shay Gueron and Nicky Mouha.
Simpira v2: A Family of Efficient Permutations Using the AES Round Function.
ePrint preprint
-
Leon Groot Bruinderink.
Towards Post-Quantum Bitcoin -- Side-Channel Analysis of Bimodal Lattice Signatures.
Master Thesis.
-
Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan.
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry
Codes and their subcodes.
Preprint 2016.
arxiv 1401.6025.
-
Marc Kaplan and Gaëtan Leurent and Anthony Leverrier and María Naya-Plasencia.
Quantum Differential and Linear Cryptanalysis.
Preprint 2016.
arxiv 1510.05836.
-
Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, and Christian Rechberger.
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications
ePrint preprint
-
Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions.
Preprint 2015.
arxiv 1402.3264.
-
Ming-Shing Chen, Daniel Smith-Tone, and Bo-Yin Yang.
PFLASH - Secure Asymmetric Signatures on Smartcards.
NIST workshop copy.
Scientific deliverables
Last modified: 2019.03.04
|