Cryptography Modernization Part 2: Crypto-agility and hybrid schemes Preparing for migration to post-quantum cryptography (PQC) involves...
Securing telecommunications networks against the quantum threat In the near future, it's likely that the development of quantum...
11/06/2020 Post-Quantum Ciphertext Compression and Applications to Secure Group Messaging A standard method to establish secure comms between two or more parties is to encrypt a common session key via a key encapsulation mechanism (or KEM)....
11/06/2020 Secure Update Propagation via Set-Homomorphic Signatures Maintaining a consistent database across all nodes of distributed network is a vital but challenging task, especially in an asynchronous setting. In this...
01/05/2020 Friet: An Authenticated Encryption Scheme with Built-in Fault Detection EUROCRYPT 2020 - Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
01/05/2020 Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats EUROCRYPT 2020 - Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu
29/04/2020 Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512 Public Key Cryptography 2020 - Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
10/04/2020 Isochronous Gaussian Sampling: From Inception to Implementation PQCrypto 2020 - James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
12/03/2020 The design of scalar AES Instruction Set Extensions for RISC-V IACR Transactions on Cryptographic Hardware and Embedded Systems (2021) - Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf
02/03/2020 A Compact and Scalable Hardware/Software Co-design of SIKE IACR Transactions on Cryptographic Hardware and Embedded Systems (2020) - Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina