International audienceA recent work of Sipasseuth, Plantard and Susilo proposed to accelerate lattice-based signature verifications and compress public key storage at the cost of a precomputation on a public key. This first approach, which focused on a restricted type of key, did not include most NIST candidates or most lattice representations in general. In this work, we first present a way to improve even further both their verification speed and their public key compression capability by using a generator of numbers that better suit the method needs. We then also generalize their framework to apply to q-ary lattice schemes as well as classical lattices using Hermite Normal Form, improving their security and applicable scope, thus exhibit...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
We present a general framework that converts certain types of linear collision-resistant hash functi...
We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation ...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Abstract. At CT-RSA 2014 Bai and Galbraith proposed a lattice-based signature scheme optimized for s...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Abstract—Nearly all of the currently used signature schemes, such as RSA or DSA, are based either on...
Lattice based cryptography is one of the few hopes for secure public key cryptography in post quantu...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
In this paper, we present the lattice-based signature scheme Dilithium, which is a component of the ...
Abstract. Nearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are b...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
We present a general framework that converts certain types of linear collision-resistant hash functi...
We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation ...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Abstract. At CT-RSA 2014 Bai and Galbraith proposed a lattice-based signature scheme optimized for s...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Abstract—Nearly all of the currently used signature schemes, such as RSA or DSA, are based either on...
Lattice based cryptography is one of the few hopes for secure public key cryptography in post quantu...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
In this paper, we present the lattice-based signature scheme Dilithium, which is a component of the ...
Abstract. Nearly all of the currently used and well-tested signature schemes (e.g. RSA or DSA) are b...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
We present a general framework that converts certain types of linear collision-resistant hash functi...
We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation ...