Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Patrick Longa"'
Autor:
Patrick Longa
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
We propose a novel approach that generalizes interleaved modular multiplication algorithms for the computation of sums of products over large prime fields. This operation has widespread use and is at the core of many cryptographic applications. The m
Externí odkaz:
https://doaj.org/article/0b1597061c5e45de843cab1099a0d69b
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
This paper presents a set of efficient and parameterized hardware accelerators that target post-quantum lattice-based cryptographic schemes, including a versatile cSHAKE core, a binary-search CDT-based Gaussian sampler, and a pipelined NTT-based poly
Externí odkaz:
https://doaj.org/article/a115186b82554689bb7b9a933d942918
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
We present efficient and compact hardware/software co-design implementations of the Supersingular Isogeny Key Encapsulation (SIKE) protocol on field-programmable gate arrays (FPGAs). In order to be better equipped for different post-quantum scenarios
Externí odkaz:
https://doaj.org/article/9f6f5ade035d4784986e7779bf26dc25
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) protocols for 32-bit ARMv7-A processors with NEON support. The high performance
Externí odkaz:
https://doaj.org/article/692debcfd31d41459e9102048fe7852b
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031305887
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6974c56beeb4435781415458f590cd00
https://doi.org/10.1007/978-3-031-30589-4_23
https://doi.org/10.1007/978-3-031-30589-4_23
Publikováno v:
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842512
CRYPTO (3)
CRYPTO (3)
This work presents a detailed study of the classical security of the post-quantum supersingular isogeny key encapsulation (SIKE) protocol using a realistic budget-based cost model that considers the actual computing and memory costs that are needed f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b93430a8fbc5b8c3352d9e4a74666d41
https://doi.org/10.1007/978-3-030-84252-9_14
https://doi.org/10.1007/978-3-030-84252-9_14
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030453879
Public Key Cryptography (2)
Public Key Cryptography (2)
The main contribution of this work is an optimized implementation of the van Oorschot-Wiener (vOW) parallel collision finding algorithm. As is typical for cryptanalysis against conjectured hard problems (e. g. factoring or discrete logarithms), chall
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b1be0b9a67c755946669e9f78582978d
https://doi.org/10.1007/978-3-030-45388-6_18
https://doi.org/10.1007/978-3-030-45388-6_18
Autor:
Jefferson E. Ricardini, Patrick Longa, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Erdem Alkim
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578077
ACNS (1)
ACNS (1)
We present qTESLA, a post-quantum provably-secure digital signature scheme that exhibits several attractive features such as simplicity, strong security guarantees against quantum adversaries, and built-in protection against certain side-channel and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7bff2ea007bb09d9ddde55efd5aadc8d
https://doi.org/10.1007/978-3-030-57808-4_22
https://doi.org/10.1007/978-3-030-57808-4_22
Autor:
Patrick Longa, Carla Ràfols
This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, b
Publikováno v:
Journal of Cryptographic Engineering. 6:259-286
We select a set of elliptic curves for cryptography and analyze our selection from a performance and security perspective. This analysis complements recent curve proposals that suggest (twisted) Edwards curves by also considering the Weierstrass mode