Research Papers

| 08/10/2024
High-Performance NTT Hardware Accelerator to Support ML-KEM and ML-DSA
This work presents a novel architecture of a high-performance NTT accelerator capable of performing both NTT and inverse NTT operations using a single set of hardware resources.
| 16/09/2024
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
This work explores several architectural optimizations and proposes a high-performance and area-time (AT) product efficient hardware accelerator for Kyber.
| 16/09/2024
Masking the GLP Lattice-Based Signature Scheme at Any Order
In this paper, we describe the first masked implementation of a lattice-based signature scheme.
| 16/09/2024
Anonymous Reputation Systems with Revocation, Revisited
In this work, we revisit ARS. Our contributions are threefolds: First, we show that all previous definitions of ARS allow the users’ purchase history to leak.
| 16/09/2024
Compact NIZKs from Standard Assumptions on Bilinear Maps
The main focus of this work is on exploring short pairing-based NIZKs for all NP languages based on standard assumptions.
| 16/09/2024
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into masking-friendly signatures secure in the t-probing mod
| 16/09/2024
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different parties.
| 16/09/2024
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
This paper presents Raccoon, a lattice-based signature scheme submitted to the NIST 2022 call for additional post-quantum signatures.
| 16/09/2024
How Multi-Recipient KEMs can help the Deployment of Post-Quantum Cryptography
The main purpose of this work is to raise awareness about a primitive that can provide large efficiency gains in post-quantum cryptography: multi-recipient KEMs, ormKEMs.
| 16/09/2024
Optimizations and Practicality of High-Security CSIDH
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange.
| 16/09/2024
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
In this work, we present two round-optimal blind signatures under standard assumptions in the ROM with different approaches: one achieves the smallest sum of the signature and communication sizes, while the other achieves the smallest signature size.
| 16/09/2024
Antrag: Annular NTRU trapdoor generation
In this paper, we introduce a novel trapdoor generation technique for Prest's hybrid sampler over NTRU lattices.