International audienceAs the advent of general-purpose quantum computers appears to be drawing closer, agencies and advisory bodies have started recommending that we prepare the transition away from factoring and discrete logarithm-based cryptography, and towards postquantum secure constructions, such as lattice-based schemes. Almost all primitives of classical cryptography (and more!) can be realized with lattices, and the efficiency of primitives like encryption and signatures has gradually improved to the point that key sizes are competitive with RSA at similar security levels, and fast performance can be achieved both in software and hardware. However, little research has been conducted on physical attacks targeting concrete implementat...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-fa...
The progress on constructing quantum computers and the ongoing standardization of post-quantum crypt...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
International audienceAlthough postquantum cryptography is of growing practical concern, not many wo...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature sche...
Lattice-based cryptography is considered as a quantum-safe alternative for the replacement of curren...
Session I1: Post-QuantumIn the search for post-quantum secure alternatives to RSA and ECC, lattice-b...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
Lattice-based cryptography is considered as a quantum-safe alternative for the replacement of curren...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-fa...
The progress on constructing quantum computers and the ongoing standardization of post-quantum crypt...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
International audienceAlthough postquantum cryptography is of growing practical concern, not many wo...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature sche...
Lattice-based cryptography is considered as a quantum-safe alternative for the replacement of curren...
Session I1: Post-QuantumIn the search for post-quantum secure alternatives to RSA and ECC, lattice-b...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure...
Lattice-based cryptography is considered as a quantum-safe alternative for the replacement of curren...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-fa...
The progress on constructing quantum computers and the ongoing standardization of post-quantum crypt...