Publications

0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
| 14/09/2020
Cryptographic Divergences: New Techniques and New Applications
In the recent years, some security proofs in cryptography have known significant improvements by replacing the statistical distance with alternative divergences.
| 03/08/2020
Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards
We present an energy requirement analysis based on extensive measurements of PQC candidate algorithms on a Cortex M4 - based reference platform.
| 11/06/2020
Post-Quantum Ciphertext Compression and Applications to Secure Group Messaging
A standard method to establish secure communications between two or more parties is to encrypt a common session key via a key encapsulation mechanism (or KEM).
| 11/06/2020
Secure Update Propagation via Set-Homomorphic Signatures
In this document, we propose to use homomorphic signatures to maintain a consistent database across all nodes of distributed network.
| 11/05/2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process.
| 10/05/2020
Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats
In this paper, we give techniques to implement Gaussian sampling over general lattices without using FPA. To this end, we revisit the approach of Peikert, using perturbation sampling.
| 29/04/2020
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
In this paper, we propose an FS-style signature scheme, called Lossy CSI-FiSh, constructed using the CSIDH-512 parameters and with a security proof.
| 10/04/2020
Isochronous Gaussian Sampling: From Inception to Implementation
We present a framework for Gaussian sampling that is extremely simple, and it is precisely this simplicity that allowed us to make it easy to implement, provably secure, portable, efficient, and provably resistant against timing attacks.
| 18/08/2019
Unifying Leakage Models on a Rényi Day
In this work, we provide new strategies to prove the security of masked implementations.
| 07/07/2019
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes.
| 26/06/2019
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme
This research proposes the first fault attack analysis of FALCON and finds its lattice trapdoor sampler is as vulnerable to fault attacks as the GPV sampler used in alternative signature schemes.
| 10/05/2019
Round5: Compact and Fast Post-quantum Public-Key Encryption
We present the ring-based configuration of the NIST submission Round5, a Ring Learning with Rounding (RLWR)- based IND-CPA secure public-key encryption scheme.