[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation

R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint… - NIST PQC …, 2019 - pq-crystals.org
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …

Quantum-safe cryptography: crossroads of coding theory and cryptography

J Wang, L Liu, S Lyu, Z Wang, M Zheng, F Lin… - Science China …, 2022 - Springer
We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum
cryptography (PQC) and information-theoretic security. From a cryptographic point of view …

Fast reduction of algebraic lattices over cyclotomic fields

P Kirchner, T Espitau, PA Fouque - Annual International Cryptology …, 2020 - Springer
We describe two very efficient polynomial-time algorithms for reducing module lattices
defined over arbitrary cyclotomic fields that solve the γ-Hermite Module-SVP problem. They …

A fully classical LLL algorithm for modules

G De Micheli, D Micciancio - Cryptology ePrint Archive, 2022 - eprint.iacr.org
The celebrated LLL algorithm for Euclidean lattices is central to cryptanalysis of well-known
and deployed protocols as it provides approximate solutions to the Shortest Vector Problem …

The complexity of the shortest vector problem

H Bennett - ACM SIGACT News, 2023 - dl.acm.org
Computational problems on point lattices play a central role in many areas of computer
science including integer programming, coding theory, cryptanalysis, and especially the …

Overflow-Detectable Floating-Point Fully Homomorphic Encryption

S Lee, DJ Shin - IEEE Access, 2024 - ieeexplore.ieee.org
A floating-point fully homomorphic encryption (FPFHE) is proposed, which is based on torus
fully homomorphic encryption equipped with programmable bootstrapping. Specifically …

Application of automorphic forms to lattice problems

S Düzlü, J Krämer - Journal of Mathematical Cryptology, 2022 - degruyter.com
In this article, we propose a new approach to the study of lattice problems used in
cryptography. We specifically focus on module lattices of a fixed rank over some number …

Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption

E Chielle, O Mazonka, H Gamil… - ACM Transactions on …, 2024 - dl.acm.org
Fully Homomorphic Encryption (FHE) enables computation directly on encrypted data. This
property is desirable for outsourced computation of sensitive data as it relies solely on the …

Star-specific Key-homomorphic PRFs from Learning with Linear Regression

VS Sehrawat, FY Yeo, D Vassilyev - IEEE Access, 2023 - ieeexplore.ieee.org
We introduce a novel method to derandomize the learning with errors (LWE) problem by
generating deterministic yet sufficiently independent LWE instances that are constructed by …