Cryptographic primitives that are secure against quantum computing are receiving growing attention with recent, steady advances in quantum computing and standardization initiatives in post-quantum cryptography by NIST and ETSI. Lattice-based cryptography is one of the families in post-quantum cryptography, demonstrating desirable features such as well-understood security, efficient performance, and versatility. In this work, we present Round2 that consists of a key-encapsulation mechanism and a public-key encryption scheme. Round2 is based on the General Learning with Rounding problem, that unifies the Learning with Rounding and Ring Learning with Rounding problems. Round2\u27s construction using the above problem allows for a unified desc...
In the last decade, there has been significant progress in the development of quantum computers, wit...
With the NIST Post quantum cryptography competition in final round, the importance of implementation...
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten w...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
In this paper, we introduce Scabbard, a suite of post-quantum key-encapsulation mechanisms. Our suit...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
We present the ring-based configuration of the NIST submission Round5, a Ring Learning with Rounding...
We present the ring-based configuration of the NIST submission Round5, a Ring Learning with Rounding...
Current public key cryptosystems that are based on the hardness of integer factorization and discret...
Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
The advent of large-scale quantum computers has resulted in significant interest in quantum-safe cry...
The NIST Post-Quantum standardization initiative, that entered its fourth round, aims to select asym...
Post-quantum cryptography is the field of study and development of cryptographic primitives providin...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
In the last decade, there has been significant progress in the development of quantum computers, wit...
With the NIST Post quantum cryptography competition in final round, the importance of implementation...
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten w...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
In this paper, we introduce Scabbard, a suite of post-quantum key-encapsulation mechanisms. Our suit...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
We present the ring-based configuration of the NIST submission Round5, a Ring Learning with Rounding...
We present the ring-based configuration of the NIST submission Round5, a Ring Learning with Rounding...
Current public key cryptosystems that are based on the hardness of integer factorization and discret...
Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
The advent of large-scale quantum computers has resulted in significant interest in quantum-safe cry...
The NIST Post-Quantum standardization initiative, that entered its fourth round, aims to select asym...
Post-quantum cryptography is the field of study and development of cryptographic primitives providin...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
In the last decade, there has been significant progress in the development of quantum computers, wit...
With the NIST Post quantum cryptography competition in final round, the importance of implementation...
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten w...