Preprints and reprints

The following papers acknowledge support by the PQCRYPTO project. This page will be filled in as the project progresses.

Scientific deliverables

Published papers (most recent first)

  • Mohamed Saied Emam Mohamed and Albrecht Petzoldt. The Shortest Signatures Ever. Indocrypt 2016, to appear. ePrint preprint
  • Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, and Peter Schwabe. From 5-pass MQ-based identification to MQ-based signatures. Advances in Cryptology – ASIACRYPT 2016, LNCS, Springer, to appear. author copy
  • Peter Schwabe and Bas Westerbaan. Solving binary MQ with Grover's algorithm. Security, Privacy, and Applied Cryptography Engineering 2016, LNCS, Springer, to appear. author copy
  • Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, and Albrecht Petzoldt. MQSAS - A Multivariate Sequential Aggregate Signature Scheme. ISC 2016. ePrint preprint
  • Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, and Douglas Stebila. Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE Conference on Computer and Communications Security (ACM CCS) 2016. ePrint preprint
  • Peter Schwabe and Ko Stoffelen. All the AES you need on Cortex-M3 and M4. Selected Areas in Cryptology – SAC 2016, LNCS, Springer, to appear. author copy
  • Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. Post-quantum key exchange – a new hope. USENIX Security Symposium 2016. author copy.
  • Erdem Alkim, Philipp Jakubeit, and Peter Schwabe. A new hope on ARM Cortex-M Security, Privacy, and Applied Cryptography Engineering 2016, LNCS, Springer, to appear. author copy
  • Johannes A. Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, and Thomas Pöppelmann. High-Performance and Lightweight Lattice-Based Public-Key Encryption. IoTPTS at AsiaCCS 2016. author copy.
  • Shay Gueron and Fabian Schlieker. Speeding up R-LWE Post-quantum Key Exchange. Secure IT Systems (NordSec 2016).
  • Irene Márquez-Corbella and Jean-Pierre Tillich. Using Reed-Solomon codes in the $(u|u+v)$ construction and an application to cryptography. ISIT 2016 arxiv 1601.08227.
  • Julia Chaulet and Nicolas Sendrier. Worst case QC-MDPC decoder for McEliece cryptosystem. ISIT 2016 arxiv 1608.06080.
  • Wouter Castryck, Ilia Iliashenko, and Frederik Vercauteren. On the Tightness of the Error Bound in Ring-LWE" to "On Error Distributions in Ring-based LWE. ANTS-XII, LMS Journal of Computation and Mathematics. ePrint preprint
  • Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, and Yuval Yarom. Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme. CHES 2016. ePrint preprint
  • Tung Chou. QcBits: constant-time small-key code-based cryptography. CHES 2016. author copy
  • Erik Boss, Vincent Grosso, Tim GŁneysu, Gregor Leander, Amir Moradi, and Tobias Schneider. Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016. ePrint preprint.
  • Marc Kaplan and Gaëtan Leurent and Anthony Leverrier and María Naya-Plasencia. Breaking Symmetric Cryptosystems using Quantum Period Finding. Crypto 2016. arxiv 1602.05973.
  • Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO 2016. ePrint preprint
  • Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner. Semantic Security and Indistinguishability in the Quantum World. CRYPTO 2016. ePrint preprint
  • Joppe W. Bos, Michael Naehrig, and Joop van de Pol. Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective. To appear in the International Journal of Applied Cryptography. ePrint preprint
  • Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq. Masking Ring-LWE. To appear in Journal of Cryptographic Engineering (special CHES 2015 issue). author copy.
  • Wouter Castryck, Ilia Iliashenko, and Frederik Vercauteren. Provably Weak Instances of Ring-LWE Revisited. EUROCRYPT 2016. ePrint preprint
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression . Fast Software Encryption - FSE 2016, LNCS, Springer, to appear. ePrint preprint.
  • Ko Stoffelen. Optimizing S-box Implementations for Several Criteria using SAT Solvers. Fast Sofware Encryption - FSE 2016. author copy
  • Andreas Hülsing, Joost Rijneveld, and Peter Schwabe. ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM. Public Key Cryptography - PKC 2016. author copy
  • Andreas Hülsing, Joost Rijneveld, and Fang Song. Mitigating Multi-Target Attacks in Hash-based Signatures. Public Key Cryptography - PKC 2016. ePrint preprint
  • Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, and Jean-Pierre Tillich. Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes. PQCrypto 2016, LNCS 9606, pp. 118-143, Springer, 2016. HAL open archive.
  • Rodolfo Canto Torres and Nicolas Sendrier. Analysis of Information Set Decoding for a Sub-linear Error Weight. PQCrypto 2016, LNCS 9606, pp. 144-161, Springer, 2016. HAL open archive.
  • Philippe Gaborit and Adrien Hauteville and Jean-Pierre Tillich. RankSynd a PRNG Based on Rank Metric. PQCrypto 2016, LNCS 9606, pp. 18-28, Springer, 2016. HAL open archive.
  • Alan Szepieniec, Jintai Ding, and Bart Preneel. Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems. PQCrypto 2016. ePrint preprint
  • Aurélie Phesso and Jean-Pierre Tillich. An Efficient Attack on a Code-Based Signature Scheme. PQCrypto 2016, LNCS 9606, pp. 86-103, Springer, 2016. HAL open archive.
  • Ingo von Maurich, Lukas Heberle, and Tim Güneysu. IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. PQCrypto 2016: 1-17 local copy.
  • Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq. Additively Homomorphic Ring-LWE Masking. PQCrypto 2016. author copy.
  • Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich. Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups. IEEE Transactions on Information Theory, vol. 62(1), pp. 184-198, 2016. arxiv 1405.5101.
  • Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich. Structural Cryptanalysis of McEliece Schemes with Compact Keys. DCC (Design, Codes, and Cryptography), vol. 79(1), pp. 87-112, 2016. HAL open archive.
  • Shay Gueron and Vlad Krasnov. Fast Quicksort Implementation Using AVX Instructions. Comput. J. 59(1): 83-90 (2016). official copy.
  • Artur Mariano and Christian Bischof. Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs. PDP2016. author copy
  • Albrecht Petzoldt, Ming-Shing Cheng, Bo-Yin Yang, Tao Chengdong, and Jintai Ding. Design Principles for HFEv- based Signature Scheme. ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, author copy.
  • Daniel Augot and Françoise Levy-dit-Vehel and Man CuongNgô. Information Sets of Multiplicity Codes. ISIT 2015, pp. 2401-2405, IEEE, 2015. arxiv 1509.00279.
  • Adrien Hauteville and Jean-Pierre Tillich. New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem. ISIT 2015, pp. 2747-2751, IEEE, 2015. arxiv 1504.05431.
  • Ingo von Maurich, Tobias Oder, and Tim Güneysu. Implementing QC-MDPC McEliece Encryption. ACM Trans. Embedded Comput. Syst. 14(3): 44 (2015) local copy.
  • Tim Güneysu, Vadim Lyubashevsky, and Thomas Pöppelmann. Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware. IEEE Trans. Computers 64(7): 1954-1967 (2015) author copy.
  • Shay Gueron and Yehuda Lindell. GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. ACM Conference on Computer and Communications Security 2015: 109-119. ePrint preprint
  • Shay Gueron, Yehuda Lindell, Ariel Nof, and Benny Pinkas. Fast Garbling of Circuits Under Standard Assumptions. ACM Conference on Computer and Communications Security 2015: 567-578. ePrint preprint
  • Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, and Ingrid Verbauwhede. A masked ring-LWE implementation. CHES 2015. ePrint preprint
  • Artur Mariano, Thijs Laarhoven, and Christian Bischof. Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing. ePrint preprint
  • Thomas Pöppelmann, Tobias Oder, and Tim Güneysu. High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers. LATINCRYPT 2015: 346-365 ePrint preprint
  • Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt. Masking large keys in hardware: a masked implementation of McEliece. SAC 2015, Sackville, New Brunswick, Canada, August 12-14, 2015. ePrint preprint.
  • Tobias Schneider, Amir Moradi, and Tim Güneysu. Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. ACNS 2015: 559-578 ePrint preprint
  • Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt. Differential Power Analysis of a McEliece Cryptosystem. ACNS 2015: 538-556 author copy.

Preprints and theses (most recent first)

  • Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, and Peter Schwabe. TESLA: Tightly-secure efficient signatures from standard lattices.
  • author copy
  • Ko Stoffelen. Instruction Scheduling and Register Allocation on ARM Cortex-M. appeared at SPEED-B. workshop handout
  • Tomer Ashur, Achiya Bar-On, Orr Dunkelman. Cryptanalysis of GOST2. ePrint preprint
  • Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vreedendaal. NTRU Prime. ePrint preprint
  • Daniel J. Bernstein. Is the security of quantum cryptography guaranteed by the laws of physics?. author copy
  • Shay Gueron and Nicky Mouha. Simpira v2: A Family of Efficient Permutations Using the AES Round Function. ePrint preprint
  • Leon Groot Bruinderink. Towards Post-Quantum Bitcoin -- Side-Channel Analysis of Bimodal Lattice Signatures. Master Thesis.
  • Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan. Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes. Preprint 2016. arxiv 1401.6025.
  • Marc Kaplan and Gaëtan Leurent and Anthony Leverrier and María Naya-Plasencia. Quantum Differential and Linear Cryptanalysis. Preprint 2016. arxiv 1510.05836.
  • Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, and Christian Rechberger. Haraka - Efficient Short-Input Hashing for Post-Quantum Applications ePrint preprint
  • Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich. Polynomial Time Attack on Wild McEliece Over Quadratic Extensions. Preprint 2015. arxiv 1402.3264.
  • Ming-Shing Chen, Daniel Smith-Tone, and Bo-Yin Yang. PFLASH - Secure Asymmetric Signatures on Smartcards. NIST workshop copy.



Last modified: 2017.04.14