With the advance of quantum computers, there is an urgent need to find replacements for public-key cryptography threatened by Shor’s quantum algorithm. This thesis presents work towards understanding post-quantum replacements for key-encapsulation mechanisms and digital signatures from an implementation perspective. The focus of this thesis lies on polynomial multiplication which is at the core of most post-quantum cryptography based on hard lattice problems. The first part covers cryptographic schemes specifically designed to benefit from a particular polynomial multiplication technique: Number-theoretic transforms. The second part covers the other lattice-based schemes that were designed without tailoring parameter choices to a specific m...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
[Abstract] Since the introduction of the ring-learning with errors problem, the number theoretic tra...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Contains the archived source code related to my PhD thesis titled "Polynomial Multiplication for Pos...
Contains the archived source code related to my PhD thesis titled "Polynomial Multiplication for Pos...
The aim of this paper is to elucidate the implications of quantum computing in present cryptography ...
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition wit...
One of the main practical implications of quantum mechanical theory is quantum computing, and theref...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The security of public-key cryptography depends on the computational intractability of some hard pro...
In recent years, public-key cryptography has become a fundamental component of digital infrastructur...
In recent years, public-key cryptography has become a fundamental component of digital infrastructur...
This research focuses on the security of public key cryptosystems under quantum attack, from a desig...
Theoretical advances in physics opened up a new window into quantum computation. This window rendere...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
[Abstract] Since the introduction of the ring-learning with errors problem, the number theoretic tra...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Contains the archived source code related to my PhD thesis titled "Polynomial Multiplication for Pos...
Contains the archived source code related to my PhD thesis titled "Polynomial Multiplication for Pos...
The aim of this paper is to elucidate the implications of quantum computing in present cryptography ...
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition wit...
One of the main practical implications of quantum mechanical theory is quantum computing, and theref...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The security of public-key cryptography depends on the computational intractability of some hard pro...
In recent years, public-key cryptography has become a fundamental component of digital infrastructur...
In recent years, public-key cryptography has become a fundamental component of digital infrastructur...
This research focuses on the security of public key cryptosystems under quantum attack, from a desig...
Theoretical advances in physics opened up a new window into quantum computation. This window rendere...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
[Abstract] Since the introduction of the ring-learning with errors problem, the number theoretic tra...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...