Team PQShield
Products
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Publications
News
Partners
Careers
Contact
Home
Team PQShield
Products
PQSDK
PQCryptoLib
PQCryptoLib – Embedded
PQPlatform – Hash
PQPlatform – Lattice
PQPlatform – CoPro
PQPlatform – SubSys
PQPerform – Lattice
Product Security
Markets
Publications
News
Partners
Careers
Contact
Publications
0
Peer-Reviewed
Papers
0
Further NIST PQC
Submissions
0
NIST PQC Standards
Co-Authored
0
Patents in
Process
0
Mature Products
Developed
0
Best Paper
Awards
SPOTLIGHT PUBLICATION | 14/08/2024
New Whitepaper: “The new NIST standards are here: what does it mean for PQC in 2024?”
Yesterday NIST published their finalized post-quantum cryptography (PQC) standards. This paper discusses the standards in more detail and what comes next.
| 04/06/2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
Using computer-assisted proof tools to ensure security and correctness of Kyber and NIST-standard ML-KEM.
| 09/05/2024
Post-Quantum Cryptography for Defence and Governmental Applications: Overview and Use Cases
Protecting the Military against the Quantum Threat to Today’s Cryptography.
Show All
Videos
Best Paper
Research Papers
Whitepapers
Filter by:
All Topics
Videos
Best Paper
Research Papers
Whitepapers
| 14/11/2020
Building a Modern TRNG: An Entropy Source Interface for RISC-V
The currently proposed RISC-V True Random Number Generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the Entropy Source (ES) component away from cryptographic PRNGs into a separate interface, and in its use of polling. We describe the interface, its use in cryptography, and offer additional discussion, background, and rationale for various aspects of it.
| 05/10/2020
ModFalcon: Compact Signatures Based On Module-NTRU Lattices
We introduce a new family of signature schemes based on the falcon design, which relies on module lattices. Our concrete instantiation enjoys the compactness and efficiency of falcon, and allows an intermediate security level.
| 14/09/2020
Cryptographic Divergences: New Techniques and New Applications
In the recent years, some security proofs in cryptography have known significant improvements by replacing the statistical distance with alternative divergences.
| 03/08/2020
Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards
We present an energy requirement analysis based on extensive measurements of PQC candidate algorithms on a Cortex M4 - based reference platform.
| 11/06/2020
Post-Quantum Ciphertext Compression and Applications to Secure Group Messaging
A standard method to establish secure communications between two or more parties is to encrypt a common session key via a key encapsulation mechanism (or KEM).
| 11/06/2020
Secure Update Propagation via Set-Homomorphic Signatures
In this document, we propose to use homomorphic signatures to maintain a consistent database across all nodes of distributed network.
| 11/05/2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process.
| 10/05/2020
Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats
In this paper, we give techniques to implement Gaussian sampling over general lattices without using FPA. To this end, we revisit the approach of Peikert, using perturbation sampling.
| 29/04/2020
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
In this paper, we propose an FS-style signature scheme, called Lossy CSI-FiSh, constructed using the CSIDH-512 parameters and with a security proof.
| 10/04/2020
Isochronous Gaussian Sampling: From Inception to Implementation
We present a framework for Gaussian sampling that is extremely simple, and it is precisely this simplicity that allowed us to make it easy to implement, provably secure, portable, efficient, and provably resistant against timing attacks.
| 18/08/2019
Unifying Leakage Models on a Rényi Day
In this work, we provide new strategies to prove the security of masked implementations.
| 07/07/2019
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes.
1
…
6
7
8
9