Deliverables
This deliverable relates to Task 1.4. This report provides a list with physical attacks that are suitable to attack post-quantum implementations against which implementations need to be validated. It also provides a statement which countermeasures are likely to disable this kind of attacks
Cloud: Security risks in public-key cryptographyThis deliverable is a progress report on Task 3.2. An update of this report will be included in D3.4.
Internet: IntegrationThis deliverable concludes Task 2.3. It describes Internet integration of WP2’s software library, and includes a successful example of high-speed high-security post-quantum Internet communication.
Cloud: Long-term public-key cryptographyThis delivearble cludes Task 3.2. It specifies new public-key primitives that are designed to last for 50 years, including a hash-based signature scheme and a code-based encryption scheme. Software implementations will be made publicly available through the Internet.
Management: first progeess report year 1Activity and management report, including reports on external cooperation and on dissemination activities (planned and achieved).
Small devices: Final reportThis deliverable relates to all tasks. It provides all results achieved by the partners in this workpackage and, in particular, a set of security parameters is specified that enable a fair comparison of all implementations. It summarizes recommendations considering the efficient software and hardware implementation of post-quantum algorithms on embedded low-cost devices. In particular, it also includes results and countermeasures obtained from mounting physical attacks against the implementations (Task 1.4).
Internet: Preliminary integrationThis deliverable is a progress report on Task 2.3. It will be superseded by D2.5.
Management: second progress reportActivity and management report, including reports on external cooperation and on dissemination activities (planned and achieved).
Standardization: Final report,The deliverable will conclude the activities undertaken in WP5 and will report on the latest developments and obtained results.
Internet: PortfolioThis deliverable concludes Task 2.1. It describes the most promising post-quantum systems for Internet applications.
Cloud: Advanced applicationsThis deliverable concludes Task 3.3. It evaluates the security of selected protocols.
Management: Data management planDetermine which parts of the project will participate in the pilot on open research data and how to organize and manage the data. This deliverable will be updated throughout the lifetime of the project.
Cloud: Security risks in secret-key cryptographyThis deliverable is a progress report on Task 3.1. An update of this report will be included in D3.3.
Standardization: Preliminary reportThe report will cover all ongoing standardization activities and mid-course achievements towards the objectives of WP5.
Internet: Preliminary portfolioThis deliverable is a progress report on Task 2.1. It will be superseded by D2.3.
Small devices: Intermediate report on algorithmsThis deliverable relates to Task 1.1. It provides a report on (preliminary) studies done by the partners summarizing the main particularities of the state-of-the-art works on post-quantum implementations.
Small devices: Intermediate report on optimized hardware,This deliverable relates to Task 1.3. It provides a report the preliminary hardware implementation results of the selected post-quantum schemes and corresponding parameters for embedded systems.
Small devices: Intermediate report on optimized softwareThis deliverable relates to Task 1.2. It provides a report the preliminary software implementation results of the selected post-quantum schemes and corresponding parameters for embedded systems.
Cloud: Long-term authenticated ciphersThis deliverable concludes Task 3.1. It specifies new authenticated ciphers that are designed to last for 50 years. Software implementations will be made publicly available through the Internet.
Launch of the public project website, internal websites and other IT infrastructure.
Internet: Software library,This deliverable concludes Task 2.2.It describes the functionality and use of WP2’s software library for post-quantum cryptography.
Small devices: Final implementationsThis deliverable relates to Tasks 1.2 and 1.3. Software and hardware implementations are delivered and made public together with the corresponding specifications and implementation guidelines.
Small devices: Reference implementationsThis deliverable concludes Task 1.1. Reference implementations of selected post-quantum algorithms are implemented and made public together with the corresponding test vectors.
Publications
Author(s):
Stoffelen, Ko; Daemen, Joan
Published in:
IACR Transactions on Symmetric Cryptology, Issue 1, 2018, Page(s) 126-159, ISSN 2519-173X
Publisher:
IACR
DOI:
10.13154/tosc.v2018.i1.126-159
Author(s):
Kranz, Thorsten; Leander, Gregor; Stoffelen, Ko; Wiemer, Friedrich
Published in:
IACR Transactions on Symmetric Cryptology, Issue 4, 2017, ISSN 2519-173X
Publisher:
IACR
DOI:
10.13154/tosc.v2017.i4.188-211
Author(s):
Ashur, Tomer; Bar-On, Achiya; Dunkelman, Orr
Published in:
IACR Transactions on Symmetric Cryptology, Issue 8, 2017, ISSN 2519-173X
Publisher:
IACR
DOI:
10.13154/tosc.v2017.i1.203-214
Author(s):
Kölbl, Stefan; Lauridsen, Martin M.; Mendel, Florian; Rechberger, Christian
Published in:
IACR Transactions on Symmetric Cryptology, Issue 5, 2016, ISSN 2519-173X
Publisher:
IACR
DOI:
10.13154/tosc.v2016.i2.1-29
Author(s):
Kaplan, Marc; Leurent, Gaëtan; Leverrier, Anthony; Naya-Plasencia, María
Published in:
IACR Transactions on Symmetric Cryptology, Issue 9, 2016, ISSN 2519-173X
Publisher:
IACR
DOI:
10.13154/tosc.v2016.i1.71-94
Author(s):
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
Published in:
IEEE Transactions on Information Theory, Issue 63/1, 2017, Page(s) 404-427, ISSN 0018-9448
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TIT.2016.2574841
Author(s):
Ashur, Tomer; Dunkelman, Orr; Talmon, Nimrod
Published in:
Lecture Notes in Computer Science, Issue 6, 2016, ISSN 0302-9743
Publisher:
Springer Verlag
Author(s):
Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
Published in:
Journal of Cryptology, Issue 31/3, 2018, Page(s) 641-670, ISSN 0933-2790
Publisher:
Springer Verlag
DOI:
10.1007/s00145-017-9266-8
Author(s):
Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
Published in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, ISSN 2569-2925
Publisher:
Ruhr-University of Bochum
DOI:
10.13154/tches.v2018.i1.142-174
Author(s):
Shoni Gilboa, Shay Gueron, Ben Morris
Published in:
Journal of Cryptology, Issue 31/1, 2018, Page(s) 162-171, ISSN 0933-2790
Publisher:
Springer Verlag
DOI:
10.1007/s00145-017-9253-0
Author(s):
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Published in:
Journal of Cryptology, Issue 31/3, 2018, Page(s) 885-916, ISSN 0933-2790
Publisher:
Springer Verlag
DOI:
10.1007/s00145-017-9273-9
Author(s):
Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé
Published in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, ISSN 2569-2925
Publisher:
Ruhr-University of Bochum
DOI:
10.13154/tches.v2018.i1.238-268
Author(s):
Nir Drucker, Shay Gueron, Benny Pinkas
Published in:
IEEE Security & Privacy, Issue 15/6, 2017, Page(s) 61-67, ISSN 1540-7993
Publisher:
IEEE Computer Society
DOI:
10.1109/MSP.2017.4251121
Author(s):
Daniel Augot, Pierre Loidreau, Gwezheneg Robert
Published in:
Designs, Codes and Cryptography, Issue 86/8, 2018, Page(s) 1807-1848, ISSN 0925-1022
Publisher:
Kluwer Academic Publishers
DOI:
10.1007/s10623-017-0425-6
Author(s):
Nina Bindel, Johannes Buchmann, Susanne Rieß
Published in:
International Journal of Information Security, 2017, ISSN 1615-5262
Publisher:
Springer Verlag
DOI:
10.1007/s10207-017-0397-6
Author(s):
Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
Published in:
ACM Transactions on Embedded Computing Systems, Issue 16/4, 2017, Page(s) 1-24, ISSN 1539-9087
Publisher:
Association for Computing Machinary, Inc.
DOI:
10.1145/3092951
Author(s):
Daniel J. Bernstein, Tanja Lange
Published in:
Nature, Issue 549/7671, 2017, Page(s) 188-194, ISSN 0028-0836
Publisher:
Nature Publishing Group
DOI:
10.1038/nature23461
Author(s):
Alain Couvreur, Irene Marquez-Corbella, Ruud Pellikaan
Published in:
IEEE Transactions on Information Theory, Issue 63/8, 2017, Page(s) 5404-5418, ISSN 0018-9448
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TIT.2017.2712636
Author(s):
Shay Gueron
Published in:
IEEE Security & Privacy, Issue 14/6, 2016, Page(s) 54-62, ISSN 1540-7993
Publisher:
IEEE Computer Society
DOI:
10.1109/MSP.2016.124
Author(s):
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Published in:
IEEE Transactions on Information Forensics and Security, Issue 11/6, 2016, Page(s) 1093-1105, ISSN 1556-6013
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TIFS.2015.2509944
Author(s):
Oscar Reparaz, Sujoy Sinha Roy, Ruan de Clercq, Frederik Vercauteren, Ingrid Verbauwhede
Published in:
Journal of Cryptographic Engineering, Issue 6/2, 2016, Page(s) 139-153, ISSN 2190-8508
Publisher:
Springer Science + Business Media
DOI:
10.1007/s13389-016-0126-5
Author(s):
Ingo Von Maurich, Tobias Oder, Tim Güneysu
Published in:
ACM Transactions on Embedded Computing Systems, Issue 14/3, 2015, Page(s) 1-27, ISSN 1539-9087
Publisher:
Association for Computing Machinary, Inc.
DOI:
10.1145/2700102
Author(s):
Shay Gueron, Vlad Krasnov
Published in:
The Computer Journal, 2016, Page(s) bxv063, ISSN 0010-4620
Publisher:
Oxford University Press
DOI:
10.1093/comjnl/bxv063
Author(s):
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
Published in:
Designs, Codes and Cryptography, Issue 79/1, 2016, Page(s) 87-112, ISSN 0925-1022
Publisher:
Kluwer Academic Publishers
DOI:
10.1007/s10623-015-0036-z
Author(s):
Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret, Frederic de Portzamparc, Jean-Pierre Tillich
Published in:
IEEE Transactions on Information Theory, Issue 62/1, 2016, Page(s) 184-198, ISSN 0018-9448
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TIT.2015.2493539
Author(s):
Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
Published in:
IEEE Transactions on Computers, Issue 64/7, 2015, Page(s) 1954-1967, ISSN 0018-9340
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TC.2014.2346177
Author(s):
Stoffelen, Ko; Daemen, Joan
Published in:
2519-173X, Issue 1, 2018, ISSN 2519-173X
Publisher:
IACR
DOI:
10.13154/tosc.v2018.i1.126-159
Author(s):
Ducas, L.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehle, D.
Published in:
IACR Transactions on Cryptographic Hardware and Embedded System, Issue 1, 2018, Page(s) 238 -- 268, ISSN 2569-2925
Publisher:
IACR
DOI:
10.13154/tches.v2018.i1.238-268
Author(s):
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Published in:
LMS Journal of Computation and Mathematics, Issue 19/A, 2016, Page(s) 130-145, ISSN 1461-1570
Publisher:
London Mathematical Society
DOI:
10.1112/S1461157016000280
Author(s):
Steven D. Galbraith, Frederik Vercauteren
Published in:
Quantum Information Processing, Issue 17/10, 2018, ISSN 1570-0755
Publisher:
Kluwer Academic Publishers
DOI:
10.1007/s11128-018-2023-6
Author(s):
Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
Published in:
16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings, 2017, Page(s) 207-226
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-71045-7_11
Author(s):
Thomas Debris-Alazard, Jean-Pierre Tillich
Published in:
2017 IEEE International Symposium on Information Theory (ISIT), 2017, Page(s) 1798-1802, ISBN 978-1-5090-4096-4
Publisher:
IEEE
DOI:
10.1109/ISIT.2017.8006839
Author(s):
Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
Published in:
CRYPTO 2017: Advances in Cryptology, 2017, Page(s) 194-224
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-63697-9_7
Author(s):
Shay Gueron, Nicky Mouha
Published in:
ASIACRYPT 2016: Advances in Cryptology, 2016, Page(s) 95-125
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53887-6_4
Author(s):
Sébastien Duval, Virginie Lallemand, Yann Rotella
Published in:
CRYPTO 2016: Advances in Cryptology, 2016, Page(s) 457-475
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53018-4_17
Author(s):
Yves Aubry, Wouter Castryck, Sudhir R. Ghorpade, Gilles Lachaud, Michael E. O’Sullivan, Samrith Ram
Published in:
Algebraic Geometry for Coding Theory and Cryptography, 2017, Page(s) 25-61
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-63931-4_2
Author(s):
Stoffelen, K.
Published in:
SPEED-B - Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, 1 - 9. [S.l. : s.n.], 2016
Publisher:
ECRYPT-CSA
Author(s):
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
Published in:
AFRICACRYPT 2018, 2018, Page(s) 203-216
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-89339-6_12
Author(s):
Tobias Oder and Tim Güneysu
Published in:
Latincrypt, Issue to appear, 2019
Publisher:
Springer
Author(s):
Joppe Bos, Leo Ducas, Eike Kiltz, T Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehle
Published in:
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 353-367, ISBN 978-1-5386-4228-3
Publisher:
IEEE
DOI:
10.1109/eurosp.2018.00032
Author(s):
Denis Butin, Julian Walde, Johannes Buchmann
Published in:
2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU), 2017, Page(s) 1-6, ISBN 978-4-907626-31-0
Publisher:
IEEE
DOI:
10.23919/icmu.2017.8330093
Author(s):
Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
Published in:
COSADE 2018, 2018, Page(s) 168-188
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-89641-0_10
Author(s):
Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
Published in:
PQCrypto 2018, 2018, Page(s) 47-76
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-79063-3_3
Author(s):
Daniel J. Bernstein, Bo-Yin Yang
Published in:
PQCrypto 2018, 2018, Page(s) 487-506
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-79063-3_23
Author(s):
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
Published in:
PQCrypto 2018, 2018, Page(s) 185-204
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-79063-3_9
Author(s):
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Published in:
PKC 2018, 2018, Page(s) 3-33
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-76581-5_1
Author(s):
Stefan Kölbl
Published in:
PQCrypto 2018, 2018, Page(s) 205-226
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-79063-3_10
Author(s):
Andreas Hülsing, Tanja Lange, Kit Smeets
Published in:
PKC 2018, 2018, Page(s) 728-757
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-76581-5_25
Author(s):
Patrick Holzer, Thomas Wunderer, Johannes A. Buchmann
Published in:
Indocrypt 2017, 2017, Page(s) 346-368
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-71667-1_18
Author(s):
Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
Published in:
Asiacrypt 2017, 2017, Page(s) 297-322
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-70694-8_11
Author(s):
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
Published in:
SAC 2017, 2018, Page(s) 235-260
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-72565-9_12
Author(s):
André Chailloux, María Naya-Plasencia, André Schrottenloher
Published in:
Asiacrypt 2017, 2017, Page(s) 211-240
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-70697-9_8
Author(s):
Robin Kwant, Tanja Lange, Kimberley Thissen
Published in:
SAC 2017, 2018, Page(s) 336-354
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-72565-9_17
Author(s):
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
Published in:
CHES 2017, 2017, Page(s) 299-320
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-66787-4_15
Author(s):
Leon Groot Bruinderink, Andreas Hülsing
Published in:
SAC 2017, 2018, Page(s) 299-322
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-72565-9_15
Author(s):
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
Published in:
CHES 2017, 2017, Page(s) 555-576
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-66787-4_27
Author(s):
Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
Published in:
Foundations and Practice of Security, 2017, Page(s) 225-241
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-75650-9_15
Author(s):
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
Published in:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1843-1855, ISBN 9781-450349468
Publisher:
ACM Press
DOI:
10.1145/3133956.3134023
Author(s):
Shay Gueron, Yehuda Lindell
Published in:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1019-1036, ISBN 9781-450349468
Publisher:
ACM Press
DOI:
10.1145/3133956.3133992
Author(s):
Nir Drucker, Shay Gueron
Published in:
Proceedings of the 2017 International Workshop on Managing Insider Security Threats - MIST '17, 2017, Page(s) 85-88, ISBN 9781-450351775
Publisher:
ACM Press
DOI:
10.1145/3139923.3139933
Author(s):
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
Published in:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1825-1842, ISBN 9781-450349468
Publisher:
ACM Press
DOI:
10.1145/3133956.3133997
Author(s):
Leonid Azriel, Ran Ginosar, Shay Gueron, Avi Mendelson
Published in:
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016 on - HASP 2016, 2016, Page(s) 1-8, ISBN 9781-450347693
Publisher:
ACM Press
DOI:
10.1145/2948618.2948619
Author(s):
Nir Drucker, Shay Gueron
Published in:
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, Page(s) 848-853, ISBN 978-1-5090-6196-9
Publisher:
IEEE
DOI:
10.1109/CCNC.2017.7983244
Author(s):
Andreas Hülsing, Joost Rijneveld, John Schanck, Peter Schwabe
Published in:
CHES 2017, 2017, Page(s) 232-252
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-66787-4_12
Author(s):
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
Published in:
Eurocrypt 2017, 2017, Page(s) 27-59
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-56620-7_2
Author(s):
Tomer Ashur, Orr Dunkelman, Atul Luykx
Published in:
CRYPTO 2017, 2017, Page(s) 3-33
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-63697-9_1
Author(s):
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Published in:
Crypto 2017, 2017, Page(s) 185-206
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53008-5_7
Author(s):
Nina Bindel, Juliane Krämer, Johannes Schreiber
Published in:
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion - CODES '17, 2017, Page(s) 1-3, ISBN 9781-450351850
Publisher:
ACM Press
DOI:
10.1145/3125502.3125546
Author(s):
Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
Published in:
PQCrypto 2017, 2017, Page(s) 311-329
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-59879-6_18
Author(s):
Ghazal Kachigar, Jean-Pierre Tillich
Published in:
PQCrypto 2017, 2017, Page(s) 69-89
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-59879-6_5
Author(s):
Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
Published in:
PQCrypto 2017, 2017, Page(s) 384-405
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-59879-6_22
Author(s):
Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
Published in:
PQCrypto 2017, 2017, Page(s) 330-346
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-59879-6_19
Author(s):
Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
Published in:
PQCrypto 2017, 2017, Page(s) 143-162
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-59879-6_9
Author(s):
Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
Published in:
PQCrypto 2017, 2017, Page(s) 184-202
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-59879-6_11
Author(s):
Bart Mennink, Alan Szepieniec
Published in:
PQCrypto 2017, 2017, Page(s) 367-383
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-59879-6_21
Author(s):
Tim Guneysu, Tobias Oder
Published in:
2017 18th International Symposium on Quality Electronic Design (ISQED), 2017, Page(s) 319-324, ISBN 978-1-5090-5404-6
Publisher:
IEEE
DOI:
10.1109/ISQED.2017.7918335
Author(s):
Olivier Blazy, Philippe Gaborit, Julien Schrek, Nicolas Sendrier
Published in:
2017 IEEE International Symposium on Information Theory (ISIT), 2017, Page(s) 2718-2722, ISBN 978-1-5090-4096-4
Publisher:
IEEE
DOI:
10.1109/ISIT.2017.8007023
Author(s):
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Published in:
Africacrypt 2017, 2017, Page(s) 3-20
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-57339-7_1
Author(s):
Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter
Published in:
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17, 2017, Page(s) 197-204, ISBN 9781-450345231
Publisher:
ACM Press
DOI:
10.1145/3029806.3029836
Author(s):
Gustavo Banegas, Daniel J. Bernstein
Published in:
SAC 2017, 2017, Page(s) 325-335
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-72565-9_16
Author(s):
Dan Boneh, Shay Gueron
Published in:
CT-RSA 2017, 2017, Page(s) 149-164
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-52153-4_9
Author(s):
Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
Published in:
Financial Cryptography and Data Security 2017, 2017, Page(s) 437-454
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-70972-7_25
Author(s):
Erick Nascimento, Łukasz Chmielewski, David Oswald, Peter Schwabe
Published in:
SAC 2016, 2017, Page(s) 99-119
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-69453-5_6
Author(s):
Peter Schwabe, Bas Westerbaan
Published in:
SPACE 2016, 2016, Page(s) 303-322
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-49445-6_17
Author(s):
Joppe W. Bos, Simon Friedberger
Published in:
2017 IEEE 24th Symposium on Computer Arithmetic (ARITH), 2017, Page(s) 148-155, ISBN 978-1-5386-1965-0
Publisher:
IEEE
DOI:
10.1109/ARITH.2017.15
Author(s):
Shay Gueron
Published in:
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Issue FDTC 2016, 2016, Page(s) 1-3, ISBN 978-1-5090-1108-7
Publisher:
IEEE
DOI:
10.1109/FDTC.2016.20
Author(s):
Nina Bindel, Johannes Buchmann, Juliane Kramer
Published in:
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016, Page(s) 63-77, ISBN 978-1-5090-1108-7
Publisher:
IEEE
DOI:
10.1109/FDTC.2016.11
Author(s):
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
Published in:
Africacrypt 2016, 2016, Page(s) 44-60
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-31517-1_3
Author(s):
Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
Published in:
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography - AsiaPKC '16, 2016, Page(s) 11-20, ISBN 9781-450342865
Publisher:
ACM Press
DOI:
10.1145/2898420.2898422
Author(s):
Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
Published in:
Africacrypt 2016, 2016, Page(s) 24-43
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-31517-1_2
Author(s):
Joppe Bos, Craig Costello, Leo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
Published in:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Page(s) 1006-1018, ISBN 9781-450341394
Publisher:
ACM Press
DOI:
10.1145/2976749.2978425
Author(s):
Julia Chaulet, Nicolas Sendrier
Published in:
2016 IEEE International Symposium on Information Theory (ISIT), 2016, Page(s) 1366-1370, ISBN 978-1-5090-1806-2
Publisher:
IEEE
DOI:
10.1109/ISIT.2016.7541522
Author(s):
Artur Mariano, Christian Bischof
Published in:
2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), 2016, Page(s) 545-552, ISBN 978-1-4673-8776-7
Publisher:
IEEE
DOI:
10.1109/PDP.2016.31
Author(s):
Shay Gueron, Yehuda Lindell
Published in:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Page(s) 109-119, ISBN 9781-450338325
Publisher:
ACM Press
DOI:
10.1145/2810103.2813613
Author(s):
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
Published in:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Page(s) 567-578, ISBN 9781-450338325
Publisher:
ACM Press
DOI:
10.1145/2810103.2813619
Author(s):
Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
Published in:
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS '16, 2016, Page(s) 2-9, ISBN 9781-450342834
Publisher:
ACM Press
DOI:
10.1145/2899007.2899011
Author(s):
Daniel Augot, Francoise Levy-dit-Vehel, Cuong M. Ngo
Published in:
2015 IEEE International Symposium on Information Theory (ISIT), 2015, Page(s) 2401-2405, ISBN 978-1-4673-7704-1
Publisher:
IEEE
DOI:
10.1109/ISIT.2015.7282886
Author(s):
Adrien Hauteville, Jean-Pierre Tillich
Published in:
2015 IEEE International Symposium on Information Theory (ISIT), 2015, Page(s) 2747-2751, ISBN 978-1-4673-7704-1
Publisher:
IEEE
DOI:
10.1109/ISIT.2015.7282956
Author(s):
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
Published in:
25th USENIX Security Symposium (USENIX Security 16), 2016
Publisher:
USENIX Association
Author(s):
Artur Mariano, Christian Bischof, Thijs Laarhoven
Published in:
2015 44th International Conference on Parallel Processing, 2015, Page(s) 590-599, ISBN 978-1-4673-7587-0
Publisher:
IEEE
DOI:
10.1109/ICPP.2015.68
Author(s):
Irene Marquez-Corbella, Jean-Pierre Tillich
Published in:
2016 IEEE International Symposium on Information Theory (ISIT), 2016, Page(s) 930-934, ISBN 978-1-5090-1806-2
Publisher:
IEEE
DOI:
10.1109/ISIT.2016.7541435
Author(s):
Alkim, E.; Jakubeit, P.; Schwabe, P.; Carlet, C.; Hasan, A.; Saraswat, V.
Published in:
Security, Privacy, and Applied Cryptography Engineering. SPACE 2016. Lecture Notes in Computer Science, Issue 10076, 2016, Page(s) 332-349, ISBN 978-3-319-49445-6
Publisher:
Springer
DOI:
10.1007/978-3-319-49445-6_19
Author(s):
Albrecht, M.; Bai, S.; Ducas, Léo; Robshaw, M.; Katz, J.
Published in:
Advances in Cryptology – CRYPTO 2016, Lecture Notes in Computer Science, Issue 9814, 2016, Page(s) 153-178, ISBN 978-3-662-53018-4
Publisher:
Springer
DOI:
10.1007/978-3-662-53018-4_6
Author(s):
Schwabe, P.; Stoffelen, K.; Avanzi, R.; Heys, H.
Published in:
Selected Areas in Cryptography – SAC 2016, Lecture notes in computer science, Issue 10532, 2017, Page(s) 180 - 194, ISBN 978-3-319-69452-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-69453-5_10
Author(s):
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny
Published in:
Eurocrypt 2019, lecture notes in computer science, 2019
Publisher:
Springer
Author(s):
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe.
Published in:
25th USENIX Security Symposium, 2016, Page(s) 327--343, ISBN 978-1-931971-32-4
Publisher:
USENIX Association
Author(s):
Gilboa, Shoni; Gueron, Shay
Published in:
2016
Publisher:
arXiv
Author(s):
Tillich, Jean-Pierre
Published in:
2018
Publisher:
arXiv
Author(s):
Bardet , Magali; Barelli , Elise; Blazy , Olivier; Canto Torres , Rodolfo; Couvreur , Alain; Gaborit , Philippe; Otmani , Ayoub; Sendrier , Nicolas; Tillich , Jean-Pierre
Published in:
submission to the NIST post quantum cryptography standardization process. 2017, 2017
Publisher:
INRIA
Author(s):
Aragon , Nicolas; Barreto , Paulo ,; Bettaieb , Slim; Bidoux , Loïc; Blazy , Olivier; Deneuville , Jean-Christophe; Gaborit , Philippe; Gueron , Shay; Guneysu , Tim; Aguilar Melchor , Carlos; Misoczki , Rafael; Persichetti , Edoardo; Sendrier , Nicolas; Tillich , Jean-Pierre; Zémor , Gilles
Published in:
https://hal.archives-ouvertes.fr/hal-01671903, 2017
Publisher:
INRIA
Author(s):
A. Huelsing
D. Butin
S. Gazdag
J. Rijneveld
A. Mohaisen
Published in:
RFC, Issue 8391, 2018
Publisher:
IRTF
DOI:
10.17487/RFC8391
Author(s):
Daniel J. Bernstein and Edoardo Persichetti
Published in:
IACR ePrint archive, Issue 2018/526, 2018
Publisher:
IACR
Author(s):
Daniel J. Bernstein
Published in:
quant-ph arXiv, Issue 1803.04520, 2018
Publisher:
online
Author(s):
Philippe Gaborit, Adrien Hauteville, Jean-Pierre Tillich
Published in:
Post-Quantum Cryptography, 2016, Page(s) 18-28, ISBN 978-3-319-29360-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29360-8_2
Author(s):
Ko Stoffelen
Published in:
Fast Software Encryption, 2016, Page(s) 140-160, ISBN 978-3-662-52993-5
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-52993-5_8
Author(s):
Ingo von Maurich, Lukas Heberle, Tim Güneysu
Published in:
Post-Quantum Cryptography, 2016, Page(s) 1-17, ISBN 978-3-319-29360-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29360-8_1
Author(s):
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Published in:
Advances in Cryptology – EUROCRYPT 2016, 2016, Page(s) 147-167, ISBN 978-3-662-49890-3
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49890-3_6
Author(s):
Rodolfo Canto Torres, Nicolas Sendrier
Published in:
Post-Quantum Cryptography, 2016, Page(s) 144-161, ISBN 978-3-319-29360-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29360-8_10
Author(s):
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Published in:
Applied Cryptography and Network Security, 2015, Page(s) 538-556, ISBN 978-3-319-28166-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-28166-7_26
Author(s):
Andreas Hülsing, Joost Rijneveld, Fang Song
Published in:
Public-Key Cryptography – PKC 2016, 2016, Page(s) 387-416, ISBN 978-3-662-49384-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49384-7_15
Author(s):
Andreas Hülsing, Joost Rijneveld, Peter Schwabe
Published in:
Public-Key Cryptography – PKC 2016, 2016, Page(s) 446-470, ISBN 978-3-662-49384-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49384-7_17
Author(s):
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Published in:
Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 683-702, ISBN 978-3-662-48324-4
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-48324-4_34
Author(s):
Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich
Published in:
Post-Quantum Cryptography, 2016, Page(s) 118-143, ISBN 978-3-319-29360-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29360-8_9
Author(s):
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Published in:
Fast Software Encryption, 2016, Page(s) 313-333, ISBN 978-3-662-52993-5
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-52993-5_16
Author(s):
Aurélie Phesso, Jean-Pierre Tillich
Published in:
Post-Quantum Cryptography, 2016, Page(s) 86-103, ISBN 978-3-319-29360-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29360-8_7
Author(s):
Alan Szepieniec, Jintai Ding, Bart Preneel
Published in:
Post-Quantum Cryptography, 2016, Page(s) 182-196, ISBN 978-3-319-29360-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29360-8_12
Author(s):
Oscar Reparaz, Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Published in:
Post-Quantum Cryptography, 2016, Page(s) 233-244, ISBN 978-3-319-29360-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-29360-8_15
Author(s):
Shay Gueron, Fabian Schlieker
Published in:
Secure IT Systems, 2016, Page(s) 187-198, ISBN 978-3-319-47560-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-47560-8_12
Author(s):
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
Published in:
Advances in Cryptology – CRYPTO 2016, 2016, Page(s) 60-89, ISBN 978-3-662-53015-3
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53015-3_3
Author(s):
Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
Published in:
Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 323-345, ISBN 978-3-662-53140-2
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53140-2_16
Author(s):
Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding
Published in:
Advances in Cryptology -- ASIACRYPT 2015, 2015, Page(s) 311-334, ISBN 978-3-662-48797-6
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-48797-6_14
Author(s):
Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Published in:
Progress in Cryptology -- LATINCRYPT 2015, 2015, Page(s) 346-365, ISBN 978-3-319-22174-8
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-22174-8_19
Author(s):
Tobias Schneider, Amir Moradi, Tim Güneysu
Published in:
Applied Cryptography and Network Security, 2015, Page(s) 559-578, ISBN 978-3-319-28166-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-28166-7_27
Author(s):
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Published in:
Selected Areas in Cryptography – SAC 2015, 2016, Page(s) 293-309, ISBN 978-3-319-31301-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-31301-6_18
Author(s):
Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia
Published in:
Advances in Cryptology – CRYPTO 2016, 2016, Page(s) 207-237, ISBN 978-3-662-53008-5
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53008-5_8
Author(s):
Tung Chou
Published in:
Cryptographic Hardware and Embedded Systems – CHES 2016, 2016, Page(s) 280-300, ISBN 978-3-662-53140-2
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53140-2_14
Author(s):
Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Published in:
Information Security, 2016, Page(s) 426-439, ISBN 978-3-319-45871-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-45871-7_25
Author(s):
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Published in:
Progress in Cryptology – INDOCRYPT 2016, 2016, Page(s) 61-77, ISBN 978-3-319-49890-4
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-49890-4_4
Author(s):
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Published in:
Advances in Cryptology – ASIACRYPT 2016, Issue 10032, 2016, Page(s) 135-165, ISBN 978-3-662-53889-0
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53890-6_5
Author(s):
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
Published in:
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 395-427, ISBN 978-3-030-03331-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-030-03332-3_15
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available