Publications

0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
| 11/08/2021
An Instruction Set Extension to Support Software-Based Masking
In both hardware and software, masking can represent an effective means of hardening an implementation against side-channel attack vectors such as Differential Power Analysis (DPA).
| 09/07/2021
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
This paper introduces a new framework for the composition of probing-secure circuits.
| 11/05/2021
SoK: How (not) to Design and Implement Post-quantum Cryptography
Post-quantum cryptography has known a Cambrian explosion in the last decade. We systematize the current state of knowledge on post-quantum cryptography.
| 01/05/2021
Exact Lattice Sampling from Non-Gaussian Distributions
We propose a new framework for (trapdoor) sampling over lattices.
| 20/03/2021
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort.
| 15/02/2021
Quantum Computing Threat: NIST PQC standards are here… how can you keep ahead?
Cryptographic agility and a clear roadmap to the NIST standards are key to a smooth and secure transition to PQC.
| 15/02/2021
Quantum Computing Threat: An Overview of Post-Quantum Cryptography
The goal of this document is to provide the reader with an understanding of the key technical ideas used in post‐quantum cryptography.
| 15/02/2021
Quantum Computing Threat: The First NIST Post-Quantum Cryptographic Standards
In 2016, the National Institute of Standards and Technology (NIST) launched a open and world‐ wide effort to propose, analyze and eventually standardize post‐quantum cryptographic schemes. In this white paper we find out more.
| 07/12/2020
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications
A multi-recipient key encapsulation mechanism, or mKEM, provides a scalable solution to securely communicating to a large group.
| 03/12/2020
The design of scalar AES Instruction Set Extensions for RISC-V
We survey the state-of-the-art industrial and academic ISEs for AES, implement and evaluate five different ISEs, one of which is novel.
| 14/11/2020
Building a Modern TRNG: An Entropy Source Interface for RISC-V
The currently proposed RISC-V True Random Number Generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the Entropy Source (ES) component away from cryptographic PRNGs into a separate interface, and in its use of polling. We describe the interface, its use in cryptography, and offer additional discussion, background, and rationale for various aspects of it.
| 05/10/2020
ModFalcon: Compact Signatures Based On Module-NTRU Lattices
We introduce a new family of signature schemes based on the falcon design, which relies on module lattices. Our concrete instantiation enjoys the compactness and efficiency of falcon, and allows an intermediate security level.