Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks

TM Fernandez-Carames, P Fraga-Lamas - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …

Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019 - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM

J Bos, L Ducas, E Kiltz, T Lepoint… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …

Post-quantum key {Exchange—A} new hope

E Alkim, L Ducas, T Pöppelmann… - 25th USENIX Security …, 2016 - usenix.org
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …

Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM

JP D'Anvers, A Karmakar, S Sinha Roy… - Progress in Cryptology …, 2018 - Springer
In this paper, we introduce Saber, a package of cryptographic primitives whose security
relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first …

From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things

TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …

A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and graded encoding schemes

M Albrecht, S Bai, L Ducas - Annual International Cryptology Conference, 2016 - Springer
The subfield attack exploits the presence of a subfield to solve overstretched versions of the
NTRU assumption: norming the public key h down to a subfield may lead to an easier lattice …

Estimate all the {LWE, NTRU} schemes!

MR Albrecht, BR Curtis, A Deo, A Davidson… - … and Cryptography for …, 2018 - Springer
We consider all LWE-and NTRU-based encryption, key encapsulation, and digital signature
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …

A key recovery attack on MDPC with CCA security using decoding errors

Q Guo, T Johansson, P Stankovski - … on the Theory and Application of …, 2016 - Springer
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of
attention in the research community, including several larger projects and a standardization …

NTRU prime: reducing attack surface at low cost

DJ Bernstein, C Chuengsatiansup, T Lange… - Selected Areas in …, 2018 - Springer
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit
special structures of the rings used in those cryptosystems. The same structures are also …