Team PQShield
Products
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Publications
News
Partners
Careers
Contact
Home
Team PQShield
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Publications
News
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2024?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
Show All
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Videos
Best Paper
Research Papers
Whitepapers
|
| 09/08/2023
Fully Adaptive Schnorr Threshold Signatures
We prove adaptive security of a simple three-round threshold Schnorr signature scheme, which we call Sparkle+.
| 09/08/2023
Snowblind: A Threshold Blind Signature in Pairing-Free Groups
Both threshold and blind signatures have, individually, received a considerable amount of attention. However little is known about their combination.
| 09/08/2023
CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme.
| 09/08/2023
Finding Short Integer Solutions When the Modulus Is Small
We present cryptanalysis of the inhomogenous short integer solution problem for anomalously small moduli q by exploiting the geometry of BKZ reduced bases of q-ary lattices.
| 31/07/2023
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android
We need to better understand the constraints and requirements of TLS usage by Android apps in order to make an informed decision for migration to the post-quantum world.
| 21/07/2023
High-Order Masking of Lattice Signatures in Quasilinear Time
We design a lattice-based signature scheme specifically for side-channel resistance and optimize the masked efficiency as a function of the number of shares.
| 30/05/2023
Cryptography Modernization Part 1: Where is your Cryptography?
A plain english guide to help you get ready to comply with the new cryptography standards.
| 23/05/2023
Signature for Objects: Formalizing How to Authenticate Physical Data and More
This paper proposes a new concept called signatures for objects to guarantee the integrity of objects cryptographically.
| 02/05/2023
A Key-Recovery Attack Against Mitaka in the t-Probing Model
We uncover a flaw in the security proof of MITAKA, and subsequently show that it is not secure in the t-probing model.
| 02/05/2023
Zero-Knowledge Arguments for Subverted RSA Groups
This work investigates zero-knowledge protocols in subverted RSA groups where the prover can choose the modulus and where the verifier does not know the group order.
| 01/05/2023
Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
This work presents field-programmable gate array (FPGA) implementations and carefully worked out optimizations of four Round-3 finalists in the NIST standardization process
| 23/03/2023
A 334 μW 0.158 mm² ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication
We demonstrate that a memory-efficient striding Toom–Cook with lazy interpolation results in a highly compact, low-power implementation, which, on top, enables a very regular memory access scheme.
1
…
3
4
5
6
7
…
9