Research Papers

| 24/04/2026
Compact, Efficient and Non-Separable Hybrid Signatures
To securepost-quantum transition, this paper introduces Hybrid EU-CMA and Silithium. By combining classical and PQ algorithms, Silithium prevents separability attacks while offering faster speeds and smaller sizes than simple concatenation.
| 22/04/2026
Generating Falcon Trapdoors via Gibbs Sampler
Falcon is a post-quantum signature scheme that usually relies on inefficient trial-and-error. This new MCMC sampling method achieves higher security and shorter signatures more efficiently while simplifying the system's overall implementation.
| 01/04/2026
Japan’s Quantum Leap: Unlocking PQC at Scale with PQShield and CRYPTREC
Today marks a massive milestone for Japan’s digital sovereignty. Following PQShield’s comprehensive evaluation of the ML-KEM algorithm for CRYPTREC (Japan’s cryptographic standardization body), the gates are officially open for quantum-safe deployment across the country’s government procurement and technology supply chains.
| | 04/03/2026
Jazzline: Composable CryptoLine functional correctness proofs for Jasmin programs
This paper introduces a way to bridge the gap between high-level logic and low-level hardware verification in cryptographic programming.
| 23/02/2026
A search to distinguish reduction for the isomorphism problem on direct sum lattices
This is paper is concerned with the theoretical basis of lattice-based cryptography, clarifying how “easy” distinguishing attacks relate to “hard” search attacks used in security proofs.
| 26/01/2026
A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform
In this paper, we present a simpler, more efficient way to create a secure, quantum-resistant shared "vault" (a threshold KEM) without using overly complex or slow mathematical tools. It's achieved by combining established cryptographic frameworks with a new, proven mathematical assumption called Coset-Hint-MLWE. The result is a highly secure system that is easier to implement and more practical for real-world use than previous versions.
| 09/01/2026
How to Compare Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol
Recent efforts to transition secure messaging to post-quantum standards, like Apple’s PQ3 and Signal’s updated Triple Ratchet, have introduced complex design trade-offs due to the high communication overhead of post-quantum cryptography. This paper introduces a pragmatic metric and experimental framework to compare these protocols, revealing that no "optimal" protocol exists when balancing security against real-world bandwidth constraints. Additionally, the authors propose a new optimization called "opportunistic sending" and a building block termed "sparse continuous key agreement" to improve protocol efficiency.
| 07/10/2025
Proving Faster Implementations Faster: Combining Deductive and Circuit-Based Reasoning in EasyCrypt
We propose a hybrid formal verification approach that combines high-level deductive reasoning and circuit-based reasoning and apply it to highly optimized cryptographic assembly code.
| 10/08/2025
Continuous Group-Key Agreement: Concurrent Updates without Pruning
Continuous Group Key Agreement (CGKA) is the primitive underlying secure group messaging. It allows a large group of N users to maintain a shared secret key that is frequently rotated by the group members in order to achieve forward secrecy and post compromise security.
| 17/07/2025
Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol
In this work, we propose TRaccoon-IA, a TRaccoon with an efficient identifiable abort protocol, allowing to identify malicious signers when the signing protocol fails.
| 17/07/2025
Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures
We analyze Signal's classically secure X3DH and harvest-now-decrypt-later-secure PQXDH, and show the settings for which PQXDH is (un)deniable against harvest-now--later attacks..and more.
| 17/07/2025
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable
In this work, we focus on the authenticity of the application messages exchanged in MLS.