CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM

J Bos, L Ducas, E Kiltz, T Lepoint… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …

Post-quantum key {Exchange—A} new hope

E Alkim, L Ducas, T Pöppelmann… - 25th USENIX Security …, 2016 - usenix.org
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

How to issue a central bank digital currency

D Chaum, C Grothoff, T Moser - arXiv preprint arXiv:2103.00254, 2021 - arxiv.org
With the emergence of Bitcoin and recently proposed stablecoins from BigTechs, such as
Diem (formerly Libra), central banks face growing competition from private actors offering …

SPHINCS: practical stateless hash-based signatures

DJ Bernstein, D Hopwood, A Hülsing, T Lange… - … conference on the …, 2015 - Springer
This paper introduces a high-security post-quantum stateless hash-based signature scheme
that signs hundreds of messages per second on a modern 4-core 3.5 GHz Intel CPU …

Cryptographic accelerators for digital signature based on Ed25519

M Bisheh-Niasar, R Azarderakhsh… - … Transactions on Very …, 2021 - ieeexplore.ieee.org
This article presents highly optimized implementations of the Ed25519 digital signature
algorithm [Edwards curve digital signature algorithm (EdDSA)]. This algorithm significantly …

Privacy-preserving aggregation of time-series data

E Shi, HTH Chan, E Rieffel, R Chow… - Annual Network & …, 2011 - hub.hku.hk
We consider how an untrusted data aggregator can learn desired statistics over multiple
participants' data, without compromising each individual's privacy. We propose a …

Elliptic curve cryptography in practice

JW Bos, JA Halderman, N Heninger, J Moore… - … Cryptography and Data …, 2014 - Springer
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in
practice today in order to reveal unique mistakes and vulnerabilities that arise in …

SIMON and SPECK: Block Ciphers for the Internet of Things

R Beaulieu, D Shors, J Smith… - Cryptology ePrint …, 2015 - eprint.iacr.org
Abstract The US National Security Agency (NSA) developed the SIMON and SPECK families
of lightweight block ciphers as an aid for securing applications in very constrained …