Lattice Codes for CRYSTALS-Kyber

S Liu, A Sakzad - arXiv preprint arXiv:2308.13981, 2023 - arxiv.org
This letter describes a lattice encoder for the NIST-recommended post-quantum encryption
algorithm: Kyber. The key idea is to refine the analysis of Kyber decoding noise. We prove …

[PDF][PDF] Design and security analysis of lattice-based post-quantum encryption

JP D'Anvers - 2021 - lirias.kuleuven.be
More and more electronic devices are connected to the internet. To secure these devices,
designers rely on cryptographic standards that provide encryption, authentication and data …

Semi-Compressed CRYSTALS-Kyber

S Liu, A Sakzad - arXiv preprint arXiv:2407.17684, 2024 - arxiv.org
In this paper, we investigate the communication overhead of the Kyber, which has recently
been standardized by the National Institute of Standards and Technology (NIST). Given the …

Arithmetic coding and blinding countermeasures for lattice signatures: Engineering a side-channel resistant post-quantum signature scheme with compact signatures

MJO Saarinen - Journal of Cryptographic Engineering, 2018 - Springer
We describe new arithmetic coding techniques and side-channel blinding countermeasures
for lattice-based cryptography. Using these techniques, we develop a practical, compact …

Post-Quantum cryptography: lattice-based encryption

E Sanou Gozalo - 2016 - upcommons.upc.edu
Post-Quantum Cryptography has gained attention in the recent years from the research
community due to the disastrous consequences that efficient quantum computers would …

Making NTRU as Secure as Worst-Case Problems over Ideal Lattices

D Stehlé, R Steinfeld - Advances in Cryptology–EUROCRYPT 2011: 30th …, 2011 - Springer
NTRUEncrypt, proposed in 1996 by Hoffstein, Pipher and Silverman, is the fastest known
lattice-based encryption scheme. Its moderate key-sizes, excellent asymptotic performance …

Encryption schemes using random oracles: from classical to post-quantum security

J Krämer, P Struck - International Conference on Post-Quantum …, 2020 - Springer
The security proofs of post-quantum cryptographic schemes often consider only classical
adversaries. Therefore, whether such schemes are really post-quantum secure remains …

Decryption failure attacks on IND-CCA secure lattice-based schemes

JP D'Anvers, Q Guo, T Johansson, A Nilsson… - … -Key Cryptography–PKC …, 2019 - Springer
In this paper we investigate the impact of decryption failures on the chosen-ciphertext
security of lattice-based primitives. We discuss a generic framework for secret key recovery …

Coding with Cyclic PAM and Vector Quantization for the RLWE/MLWE Channel

IE Bocharova, HDL Hollmann… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
In some lattice-based cryptosystems, the encryption and decryption processes can be
interpreted as a noisy communication channel. In this work, we focus on cryptosystems …

HI-Kyber: A novel high-performance implementation scheme of Kyber based on GPU

X Ji, J Dong, T Deng, P Zhang, J Hua… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
CRYSTALS-Kyber, as the only public key encryption (PKE) algorithm selected by the
National Institute of Standards and Technology (NIST) in the third round, is considered one …