[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates

K Xagawa, A Ito, R Ueno, J Takahashi… - Advances in Cryptology …, 2021 - Springer
We investigate all NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …

Post quantum fuzzy stealth signatures and applications

S Pu, SAK Thyagarajan, N Döttling… - Proceedings of the 2023 …, 2023 - dl.acm.org
Private payments in blockchain-based cryptocurrencies have been a topic of research, both
academic and industrial, ever since the advent of Bitcoin. Stealth address payments were …

Post-quantum anonymity of Kyber

V Maram, K Xagawa - IACR International Conference on Public-Key …, 2023 - Springer
Kyber is a key-encapsulation mechanism (KEM) that was recently selected by NIST in its
PQC standardization process; it is also the only scheme to be selected in the context of …

Randomized half-ideal cipher on groups with applications to UC (a) PAKE

BFD Santos, Y Gu, S Jarecki - … International Conference on the Theory and …, 2023 - Springer
Abstract An Ideal Cipher (IC) is a cipher where each key defines a random permutation on
the domain. Ideal Cipher on a group has many attractive applications, eg, the Encrypted Key …

A logic and an interactive prover for the computational post-quantum security of protocols

C Cremers, C Fontaine… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We provide the first mechanized post-quantum sound security protocol proofs. We achieve
this by developing PQ-BC, a computational first-order logic that is sound with respect to …

Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols

C Cremers, A Dax, N Medinger - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract Key Encapsulation Mechanisms (KEMs) are a critical building block for hybrid
encryption and modern security protocols, notably in the post-quantum setting. Given the …

Formally verifying Kyber

JB Almeida, SA Olmos, M Barbosa, G Barthe… - 2024 - hal.science
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Anonymity of NIST PQC round 3 KEMs

K Xagawa - Annual International Conference on the Theory and …, 2022 - Springer
This paper investigates anonymity of all NIST PQC Round 3 KEMs: Classic McEliece, Kyber,
NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime (Streamlined NTRU Prime and NTRU …