Cryptography Modernization Part 2: Crypto-agility and hybrid schemes Preparing for migration to post-quantum cryptography (PQC) involves...
Securing telecommunications networks against the quantum threat In the near future, it's likely that the development of quantum...
29/11/2022 RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems (2023) - Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham
11/11/2022 How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum CCS 2022 - Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
13/10/2022 A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling CRYPTO 2022 - Rafaël del Pino, Shuichi Katsumata
28/09/2022 Direct computation of branching programs and its applications to more efficient lattice-based cryptography Designs, Codes and Cryptography (2023) - Shuichi Katsumata, Toi Tomita, Shota Yamada
08/09/2022 Reaching consensus for asynchronous distributed key generation Distributed Comput. (2023) - Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu
07/09/2022 Secure Messaging in a Post-Quantum World The widespread adoption of smartphones has led to a meteoric rise in the use of secure messaging apps. Over 2 billion people used Whatsapp in January 2022, and 40...
09/08/2022 WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography HOST 2022 - Markku-Juhani O. Saarinen
22/06/2022 SP 800–22 and GM/T 0005–2012 Tests: Clearly Obsolete, Possibly Harmful IEEE2022 - Markku-Juhani O. Saarinen (PQShield)