Standard lattice-based key encapsulation on embedded devices

J Howe, T Oder, M Krausz, T Güneysu - Cryptology ePrint Archive, 2018 - eprint.iacr.org
key encapsulation mechanism (FrodoKEM). The security of the scheme is based on standard
lattices and the learning with errors … it is used in the key encapsulation protocol FrodoKEM. …

Post Quantum Learning With Errors Problem Based Key Encapsulation Protocols and Matrix Vector Product

E Alkım, BK Yazar - 2019 4th International Conference on …, 2019 - ieeexplore.ieee.org
… , FrodoKEM, Lizard, Emblem, Lotus key encapsulation mechanishms using LWE problem and
matrix vector product in FrodoKEM … the productions in the FrodoKEM protocol and applied …

Modification of frodokem using gray and error-correcting codes

E Lee, YS Kim, JS No, M Song, DJ Shin - IEEE Access, 2019 - ieeexplore.ieee.org
FrodoKEM [16] to improve its security level and/or lower its bandwidth. We propose a method
to apply ECCs to FrodoKEM … modifying the existing framework of FrodoKEM. Note that the …

When frodo flips: End-to-end key recovery on frodokem via rowhammer

M Fahr Jr, H Kippen, A Kwong, T Dang… - Proceedings of the …, 2022 - dl.acm.org
In this work, we recover the private key material of the FrodoKEM key exchange mechanism
as submitted to the NIST Post Quantum Cryptography (PQC) standardization process. The …

The matrix reloaded: Multiplication strategies in FrodoKEM

JW Bos, M Ofner, J Renes, T Schneider… - Cryptology and Network …, 2021 - Springer
… Along similar lines multiple clients can start the key encapsulation mechanism (using
FrodoKEM) with the same clients using the same \({\mathsf {seed}_\mathbf {A}}\) and …

Improvement of FrodoKEM System by BCH Codes and Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison

이은상 - 2020 - s-space.snu.ac.kr
… , FrodoKEM is a well-known keyencapsulation mechanism (KEM) based on (plain) learning
with errors … that do not use ring structures such as FrodoKEM, it is difficult to use ECCs …

[PDF][PDF] Tight Multi-Target Security for Key Encapsulation Mechanisms

L Glabush - 2024 - uwspace.uwaterloo.ca
… We then apply our results to FrodoKEM to resolve the aforementioned simple attacks. … We
apply these results to FrodoKEM to prove that the most recent version, which makes use of the …

About the FrodoKEM lattice-based algorithm

MÁ González de la Torre, L Hernández Encinas… - 2022 - digital.csic.es
… areas in regards to public key cryptosystems and key encapsulation mechanisms in the post-…
In particular, in our ongoing research we pretend to study the FrodoKEM proposal as one of …

Ciphertext Malleability in Lattice-Based KEMs as a Countermeasure to Side Channel Analysis

PA Berthet - arXiv preprint arXiv:2409.16107, 2024 - arxiv.org
Key Encapsulation Mechanism (KEM), namely FrodoKEM. … use FrodoKEM as an example.
We extend the work from Ravi et al.[10] to cover the higher security parameters of FrodoKEM

Error correction and reconciliation techniques for lattice-based key generation protocols

C Saliba - 2022 - theses.hal.science
… My work was initiated thanks to the INEX Paris-Seine AAP 2017 project. I thank the various
… NIST candidate FrodoKEM [N+20], which is an LWEbased key encapsulation mechanism, …