NewHope Algorithm Specifications and Supporting Documentation
暂无分享,去创建一个
Martin R. Albrecht | Joppe W. Bos | K. Paterson | N. Smart | D. Stebila | Emmanuela Orsini | P. Schwabe | R. Avanzi | T. Pöppelmann | E. Alkim | L. Ducas | A. Piedra | Valery Osheter | Guy Peer | E. Alkım
[1] Alan George,et al. Inside the FFT Black Box: Serial and Parallel Fast Fourier Transform Algorithms , 2019 .
[2] Daniel J. Bernstein,et al. Comparing proofs of security for lattice-based encryption , 2019, IACR Cryptol. ePrint Arch..
[3] Tim Güneysu,et al. Practical CCA2-Secure and Masked Ring-LWE Implementation , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[4] Damien Stehlé,et al. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM , 2017, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[5] Ashley Montanaro,et al. Quantum walk speedup of backtracking algorithms , 2015, Theory Comput..
[6] Léo Ducas,et al. Shortest Vector from Lattice Sieving: a Few Dimensions for Free , 2018, IACR Cryptol. ePrint Arch..
[7] Fernando Virdia,et al. Revisiting the Expected Cost of Solving uSVP and Applications to LWE , 2017, ASIACRYPT.
[8] Eike Kiltz,et al. A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.
[9] Stefan Mangard,et al. Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption , 2017, CHES.
[10] Tim Güneysu,et al. Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs , 2017, LATINCRYPT.
[11] Chris Peikert,et al. Pseudorandomness of ring-LWE for any ring and modulus , 2017, STOC.
[12] Yoshinori Aono,et al. Random Sampling Revisited: Lattice Enumeration with Discrete Pruning , 2017, IACR Cryptol. ePrint Arch..
[13] Gottfried Herold,et al. Improved Algorithms for the Approximate k-List Problem in Euclidean Norm , 2017, Public Key Cryptography.
[14] Christian H. Bischof,et al. A Parallel Variant of LDSieve for the SVP on Lattices , 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).
[15] Zhengzhong Jin,et al. Optimal Key Consensus in Presence of Noise , 2016, IACR Cryptol. ePrint Arch..
[16] Ronald Cramer,et al. Short Stickelberger Class Relations and Application to Ideal-SVP , 2016, EUROCRYPT.
[17] Ron Steinfeld,et al. Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance , 2015, Journal of Cryptology.
[18] Chen-Mou Cheng,et al. Post-Quantum Key Exchange on FPGAs , 2017, IACR Cryptol. ePrint Arch..
[19] Erdem Alkim,et al. NewHope on ARM Cortex-M , 2016, SPACE.
[20] Dong-Guk Han,et al. Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption , 2016, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST).
[21] Dominique Unruh,et al. Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms , 2016, TCC.
[22] Craig Costello,et al. Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE , 2016, IACR Cryptol. ePrint Arch..
[23] Martin R. Albrecht,et al. A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes , 2016, CRYPTO.
[24] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[25] Tsuyoshi Takagi,et al. Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator , 2016, EUROCRYPT.
[26] Ronald Cramer,et al. Recovering Short Generators of Principal Ideals in Cyclotomic Rings , 2016, EUROCRYPT.
[27] Marc-Olivier Killijian,et al. XPIR : Private Information Retrieval for Everyone , 2016, Proc. Priv. Enhancing Technol..
[28] Frederik Vercauteren,et al. Additively Homomorphic Ring-LWE Masking , 2016, PQCrypto.
[29] Fang Song,et al. Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fields , 2016, SODA.
[30] Martin Rötteler,et al. Post-Quantum Cryptography , 2015, Lecture Notes in Computer Science.
[31] Erdem Alkim,et al. NewHope without reconciliation , 2016, IACR Cryptol. ePrint Arch..
[32] Damien Stehlé,et al. Tuple lattice sieving , 2016, IACR Cryptol. ePrint Arch..
[33] Markku-Juhani O. Saarinen. Arithmetic Coding and Blinding Countermeasures for Ring-LWE , 2016, IACR Cryptol. ePrint Arch..
[34] Scott R. Fluhrer,et al. Cryptanalysis of ring-LWE based key exchange with key share reuse , 2016, IACR Cryptol. ePrint Arch..
[35] William Whyte,et al. Choosing Parameters for NTRUEncrypt , 2017, CT-RSA.
[36] Anja Becker,et al. New directions in nearest neighbor searching with applications to lattice sieving , 2016, IACR Cryptol. ePrint Arch..
[37] Peter Schwabe,et al. High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers , 2015, Des. Codes Cryptogr..
[38] Matthew Green,et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice , 2015, CCS.
[39] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[40] Zhe Liu,et al. Efficient Ring-LWE Encryption on 8-Bit AVR Processors , 2015, CHES.
[41] Frederik Vercauteren,et al. A masked ring-LWE implementation , 2015, IACR Cryptol. ePrint Arch..
[42] Tim Güneysu,et al. High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers , 2015, LATINCRYPT.
[43] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[44] Pierre-Alain Fouque,et al. An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices , 2015, IACR Cryptol. ePrint Arch..
[45] Craig Costello,et al. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem , 2015, 2015 IEEE Symposium on Security and Privacy.
[46] Frederik Vercauteren,et al. Efficient software implementation of ring-LWE encryption , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[47] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[48] Kenji Kashiwabara,et al. An Accelerated Algorithm for Solving SVP Based on Statistical Analysis , 2015, J. Inf. Process..
[49] Thijs Laarhoven,et al. Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing , 2015, CRYPTO.
[50] Peter Schwabe,et al. SPHINCS: Practical Stateless Hash-Based Signatures , 2015, EUROCRYPT.
[51] Michele Mosca,et al. Finding shortest lattice vectors faster using quantum search , 2015, Designs, Codes and Cryptography.
[52] Tanja Lange,et al. Kummer Strikes Back: New DH Speed Records , 2014, ASIACRYPT.
[53] Chris Peikert,et al. Lattice Cryptography for the Internet , 2014, PQCrypto.
[54] Tim Güneysu,et al. Enhanced Lattice-Based Signatures on Reconfigurable Hardware , 2014, CHES.
[55] Frederik Vercauteren,et al. Compact Ring-LWE Cryptoprocessor , 2014, CHES.
[56] Christian H. Bischof,et al. Tuning GaussSieve for Speed , 2014, LATINCRYPT.
[57] Hendrik W. Lenstra,et al. Revisiting the Gentry-Szydlo Algorithm , 2014, CRYPTO.
[58] Shay Gueron,et al. Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 , 2014, IACR Cryptol. ePrint Arch..
[59] Fang Song,et al. A quantum algorithm for computing the unit group of an arbitrary degree number field , 2014, STOC.
[60] Daniele Micciancio. CSE 206 A : Lattice Algorithms and Applications Spring 2014 Lattice Cryptography , 2014 .
[61] P. Campbell,et al. SOLILOQUY: A CAUTIONARY TALE , 2014 .
[62] Daniel J. Bernstein,et al. How to manipulate curve standards: a white paper for the black hat , 2014, IACR Cryptol. ePrint Arch..
[63] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[64] Léo Ducas,et al. Lattice Signatures and Bimodal Gaussians , 2013, IACR Cryptol. ePrint Arch..
[65] Tim Güneysu,et al. Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware , 2013, Selected Areas in Cryptography.
[66] Peter Schwabe,et al. Software Speed Records for Lattice-Based Signatures , 2013, PQCrypto.
[67] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[68] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[69] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[70] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[71] Guido Bertoni,et al. Keccak , 2013, EUROCRYPT.
[72] Sorin A. Huss,et al. On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes , 2012, CHES.
[73] Tim Güneysu,et al. Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems , 2012, CHES.
[74] Abhishek Banerjee,et al. Pseudorandom Functions and Lattices , 2012, EUROCRYPT.
[75] Stefan Katzenbeisser,et al. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs , 2012, Financial Cryptography.
[76] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[77] Steven D. Galbraith. Space-efficient variants of cryptosystems based on learning with errors , 2012 .
[78] Jintai Ding. New cryptographic constructions using generalized learning with errors problem , 2012, IACR Cryptol. ePrint Arch..
[79] Vadim Lyubashevsky,et al. Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..
[80] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[81] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[82] Damien Stehlé,et al. Analyzing Blockwise Lattice Algorithms Using Dynamical Systems , 2011, CRYPTO.
[83] Sanjeev Arora,et al. New Algorithms for Learning in Presence of Errors , 2011, ICALP.
[84] Damien Stehlé,et al. Algorithms for the Shortest and Closest Lattice Vector Problems , 2011, IWCC.
[85] Ron Steinfeld,et al. Making NTRU as Secure as Worst-Case Problems over Ideal Lattices , 2011, EUROCRYPT.
[86] Martin Hilbert,et al. The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.
[87] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[88] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[89] Damien Stehlé,et al. Terminating BKZ , 2011, IACR Cryptol. ePrint Arch..
[90] Oded Regev,et al. The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.
[91] Nicolas Gama,et al. Lattice Enumeration Using Extreme Pruning , 2010, EUROCRYPT.
[92] Craig Gentry,et al. A Simple BGN-Type Cryptosystem from LWE , 2010, EUROCRYPT.
[93] Daniele Micciancio,et al. Faster exponential time algorithms for the shortest vector problem , 2010, SODA '10.
[94] Phong Q. Nguyen,et al. The LLL Algorithm - Survey and Applications , 2009, Information Security and Cryptography.
[95] Keita Xagawa,et al. Cryptography with Lattices , 2010 .
[96] Ron Steinfeld,et al. Efficient Public Key Encryption Based on Ideal Lattices , 2009, ASIACRYPT.
[97] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[98] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[99] Chris Peikert. Some Recent Progress in Lattice-Based Cryptography , 2009, TCC.
[100] Ahmad-Reza Sadeghi,et al. Efficient Helper Data Key Extractor on FPGAs , 2008, CHES.
[101] Nicolas Gama,et al. Finding short lattice vectors within mordell's inequality , 2008, STOC.
[102] Nicolas Gama,et al. Predicting Lattice Reduction , 2008, EUROCRYPT.
[103] J. Hoffstein,et al. An introduction to mathematical cryptography , 2008 .
[104] Phong Q. Nguyen,et al. Sieve algorithms for the shortest vector problem are practical , 2008, J. Math. Cryptol..
[105] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[106] Nick Howgrave-Graham,et al. A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU , 2007, CRYPTO.
[107] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[108] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[109] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[110] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[111] Craig Gentry,et al. Cryptanalysis of the Revised NTRU Signature Scheme , 2002, EUROCRYPT.
[112] Shafi Goldwasser,et al. Complexity of lattice problems , 2002 .
[113] Shafi Goldwasser,et al. Complexity of lattice problems - a cryptographic perspective , 2002, The Kluwer international series in engineering and computer science.
[114] Ravi Kumar,et al. A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.
[115] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[116] Miklós Ajtai,et al. The shortest vector problem in L2 is NP-hard for randomized reductions (extended abstract) , 1998, STOC '98.
[117] Richard J. Lipton,et al. Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.
[118] Claus-Peter Schnorr,et al. Lattice basis reduction: Improved practical algorithms and solving subset sum problems , 1991, FCT.
[119] W. Fischer,et al. Sphere Packings, Lattices and Groups , 1990 .
[120] N. J. A. Sloane,et al. Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.
[121] C. P. Schnorr,et al. A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms , 1987, Theor. Comput. Sci..
[122] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[123] László Babai,et al. On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..
[124] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[125] Ravi Kannan,et al. Improved algorithms for integer programming and related lattice problems , 1983, STOC.
[126] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[127] H. Lenstra. Euclid's Algorithm in Cyclotomic Fields , 1975 .
[128] W. M. Gentleman,et al. Fast Fourier Transforms: for fun and profit , 1966, AFIPS '66 (Fall).
[129] A. Rényi. On Measures of Entropy and Information , 1961 .