Research Papers

| 30/01/2025
Recursive Lattice Reduction
We propose a recursive lattice reduction framework for finding short non-zero vectors or dense sublattices of a lattice.
| 30/01/2025
A Tight Security Proof for SPHINCS+, Formally Verified
In this work, we formally prove a tight security bound for SPHINCS+ using the EasyCrypt proof assistant, establishing greater confidence in the general security of the scheme and that of the parameter sets considered for standardization.
| 03/01/2025
Group signatures and more from isogenies and lattices: generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring signature) from isogeny and lattice assumptions.
| 03/01/2025
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging
In this work we prove lower bounds on the (communication) cost of maintaining a shared key among a dynamic group of users. Being "dynamic'' means one can add and remove users from the group.
| 03/01/2025
Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial Abort
In this paper, we analyze proofs based on the partitioning technique through a new lens.
| 08/10/2024
High-Performance NTT Hardware Accelerator to Support ML-KEM and ML-DSA
This work presents a novel architecture of a high-performance NTT accelerator capable of performing both NTT and inverse NTT operations using a single set of hardware resources.
| 16/09/2024
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
This work explores several architectural optimizations and proposes a high-performance and area-time (AT) product efficient hardware accelerator for Kyber.
| 16/09/2024
Masking the GLP Lattice-Based Signature Scheme at Any Order
In this paper, we describe the first masked implementation of a lattice-based signature scheme.
| 16/09/2024
Anonymous Reputation Systems with Revocation, Revisited
In this work, we revisit ARS. Our contributions are threefolds: First, we show that all previous definitions of ARS allow the users’ purchase history to leak.
| 16/09/2024
Compact NIZKs from Standard Assumptions on Bilinear Maps
The main focus of this work is on exploring short pairing-based NIZKs for all NP languages based on standard assumptions.
| 16/09/2024
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into masking-friendly signatures secure in the t-probing mod
| 16/09/2024
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different parties.