International audienceWe develop and implement efficient Gaussian preimage sampling techniques on module lattices, which rely on the works of Micciancio and Peikert in 2012, and Micciancio and Genise in 2018. The main advantage of our implementation is its modularity, which makes it practical to use for signature schemes, but also for more advanced constructions using trapdoors such as identity-based encryption. In particular, it is easy to use in the ring or module setting, and to modify the arithmetic on Rq (as different schemes have different conditions on q). Relying on these tools, we also present two instantiations and implementations of proven trapdoor-based signature schemes in the module setting: GPV in the random oracle model and ...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
ABSTRACT. Modern lattice-based public-key cryptosystems require sampling from discrete Gaussian (nor...
Abstract. Efficient implementations of lattice-based cryptographic sche-mes have been limited to onl...
International audienceWe develop and implement efficient Gaussian preimage sampling techniques on mo...
Lattice trapdoors are an important primitive used in a wide range of cryptographic protocols, such a...
We report on our implementation of a new Gaussian sampling algorithm for lattice trapdoors. Lattice ...
Lattice trapdoors are an important primitive used in a wide range of cryptographic protocols, such a...
International audienceThe GPV construction [GPV08] presents a generic construction of signature sche...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
This dissertation explores optimal algorithms employed in lattice-based cryptographic schemes. Chapt...
International audienceOur main result is a construction of a lattice-based digital signature scheme ...
We show how to construct a variety of “trapdoor ” cryptographic tools assuming the worstcase hardnes...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
ABSTRACT. Modern lattice-based public-key cryptosystems require sampling from discrete Gaussian (nor...
Abstract. Efficient implementations of lattice-based cryptographic sche-mes have been limited to onl...
International audienceWe develop and implement efficient Gaussian preimage sampling techniques on mo...
Lattice trapdoors are an important primitive used in a wide range of cryptographic protocols, such a...
We report on our implementation of a new Gaussian sampling algorithm for lattice trapdoors. Lattice ...
Lattice trapdoors are an important primitive used in a wide range of cryptographic protocols, such a...
International audienceThe GPV construction [GPV08] presents a generic construction of signature sche...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
This dissertation explores optimal algorithms employed in lattice-based cryptographic schemes. Chapt...
International audienceOur main result is a construction of a lattice-based digital signature scheme ...
We show how to construct a variety of “trapdoor ” cryptographic tools assuming the worstcase hardnes...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
ABSTRACT. Modern lattice-based public-key cryptosystems require sampling from discrete Gaussian (nor...
Abstract. Efficient implementations of lattice-based cryptographic sche-mes have been limited to onl...