Post-quantum key {Exchange—A} new hope

E Alkim, L Ducas, T Pöppelmann… - 25th USENIX Security …, 2016 - usenix.org
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

JW Bos, C Costello, M Naehrig… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
Lattice-based cryptographic primitives are believed to offer resilience against attacks by
quantum computers. We demonstrate the practicality of post-quantum key exchange by …

Post-quantum key exchange for the internet and the open quantum safe project

D Stebila, M Mosca - International Conference on Selected Areas in …, 2016 - Springer
Designing public key cryptosystems that resist attacks by quantum computers is an important
area of current cryptographic research and standardization. To retain confidentiality of …

Authenticated key exchange from ideal lattices

J Zhang, Z Zhang, J Ding, M Snook… - Advances in Cryptology …, 2015 - Springer
In this paper, we present a practical and provably secure two-pass authenticated key
exchange protocol over ideal lattices, which is conceptually simple and has similarities to …

Provably secure password authenticated key exchange based on RLWE for the post-quantum world

J Ding, S Alsayigh, J Lancrenon, S Rv… - Cryptographers' Track at …, 2017 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to
establish a high-entropy and secret session key over a insecure communications network …

An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable

K Hashimoto, S Katsumata, K Kwiatkowski, T Prest - Journal of Cryptology, 2022 - Springer
The Signal protocol is a secure instant messaging protocol that underlies the security of
numerous applications such as WhatsApp, Skype, Facebook Messenger among many …

More efficient post-quantum KEMTLS with pre-distributed public keys

P Schwabe, D Stebila, T Wiggers - … , October 4–8, 2021, Proceedings, Part …, 2021 - Springer
While server-only authentication with certificates is the most widely used mode of operation
for the Transport Layer Security (TLS) protocol on the world wide web, there are many …

Generic authenticated key exchange in the quantum random oracle model

K Hövelmanns, E Kiltz, S Schäge, D Unruh - IACR international conference …, 2020 - Springer
We propose FO_ AKE, a generic construction of two-message authenticated key exchange
(AKE) from any passively secure public key encryption (PKE) in the quantum random oracle …

Post-quantum anonymity of Kyber

V Maram, K Xagawa - IACR International Conference on Public-Key …, 2023 - Springer
Kyber is a key-encapsulation mechanism (KEM) that was recently selected by NIST in its
PQC standardization process; it is also the only scheme to be selected in the context of …