Publications

0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
| 23/04/2024
Side-channel analysis: why it matters?
Side-channel attacks are a physical type of threat that aims to recover sensitive data manipulated by your code without using cryptanalysis, or taking advantage of software vulnerabilities.
| 27/03/2024
Pioneering Side Channel Resistance for PQC
PQShield enables their customers to de-risk their development process with a comprehensive security strategy, rooted in the expertise of its world-class R&D team.
| 20/02/2024
Securing telecommunications networks against the quantum threat
In the near future, it's likely that the development of quantum computers will pose a significant threat to the methods that currently keep online information secure.
| 08/02/2024
Cryptography Modernization Part 2: Crypto-agility and hybrid schemes
In this second part to our no-nonsense guide on cryptographic modernization, our experts explore the topic of crypto-agility.
| | 23/11/2023
The Three Body Problem: There’s more to building Silicon than what EDA tools currently help with
Electronic Design Automation (EDA) tooling facilitates the development of cutting edge technologies at the nanometre scale.
| | 26/10/2023
On Gaussian sampling, smoothing parameter and application to signatures
We present a general framework for polynomial-time lattice Gaussian sampling. Using our techniques, we gain around 200 bytes (>20%) on the signature size.
| 10/08/2023
WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography
In this work, we study key handling techniques used in real-life secure Kyber and Dilithium hardware. We describe WrapQ, a masking-friendly key-wrapping mechanism designed for lattice cryptography.
| 09/08/2023
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation
We present Bingo, an adaptively secure and optimally resilient packed asynchronous verifiable secret sharing (PAVSS) protocol.
| | 09/08/2023
Fully Adaptive Schnorr Threshold Signatures
We prove adaptive security of a simple three-round threshold Schnorr signature scheme, which we call Sparkle+.
| 09/08/2023
Snowblind: A Threshold Blind Signature in Pairing-Free Groups
Both threshold and blind signatures have, individually, received a considerable amount of attention. However little is known about their combination.
| 09/08/2023
CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme.