We study a scheme of Bai and Galbraith (CT-RSA'14), also known as TESLA. TESLA was thought to have a tight security reduction from the learning with errors problem (LWE) in the random oracle model (ROM). Moreover, a variant using chameleon hash functions was lifted to the quantum random oracle model (QROM). However, both reductions were later found to be flawed and hence it remained unresolved until now whether TESLA can be proven to be tightly secure in the (Q)ROM
www.cryptoplexity.de oezguer.dagdelen @ cased.de marc.fischlin @ gmail.com tommaso @ gagliardoni.net...
In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (G...
Abstract. It has been roughly two decades since the random ora-cle model for reductionist security a...
We study a scheme of Bai and Galbraith (CT-RSA'14), also known as TESLA. TESLA was thought to have a...
8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 -- 26 June 2017 through 28 Ju...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
Abstract. Generally, lattice-based cryptographic primitives offer good performance and allow for str...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
In this paper, we study relationship between security of cryptographic schemes in the random oracle ...
In this note, we observe that a proof of quantumness in the random oracle model recently proposed by...
The famous Fiat-Shamir transformation turns any public-coin three-round interactive proof, i.e., any...
htmlabstractThe interest in post-quantum cryptography - classical systems that remain secure in the ...
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu and Zhandry on the security of...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
www.cryptoplexity.de oezguer.dagdelen @ cased.de marc.fischlin @ gmail.com tommaso @ gagliardoni.net...
In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (G...
Abstract. It has been roughly two decades since the random ora-cle model for reductionist security a...
We study a scheme of Bai and Galbraith (CT-RSA'14), also known as TESLA. TESLA was thought to have a...
8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 -- 26 June 2017 through 28 Ju...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
Abstract. Generally, lattice-based cryptographic primitives offer good performance and allow for str...
The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tig...
In this paper, we study relationship between security of cryptographic schemes in the random oracle ...
In this note, we observe that a proof of quantumness in the random oracle model recently proposed by...
The famous Fiat-Shamir transformation turns any public-coin three-round interactive proof, i.e., any...
htmlabstractThe interest in post-quantum cryptography - classical systems that remain secure in the ...
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu and Zhandry on the security of...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
www.cryptoplexity.de oezguer.dagdelen @ cased.de marc.fischlin @ gmail.com tommaso @ gagliardoni.net...
In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (G...
Abstract. It has been roughly two decades since the random ora-cle model for reductionist security a...