Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM

From MaRDI portal
Publication:1653248

DOI10.1007/978-3-319-89339-6_16zbMath1423.94065OpenAlexW2796314191MaRDI QIDQ1653248

Sujoy Sinha Roy, Jan-Pieter D'Anvers, Angshuman Karmakar, Frederik Vercauteren

Publication date: 17 July 2018

Full work available at URL: http://pure-oai.bham.ac.uk/ws/files/70656269/Saber._Module_LWR.pdf




Related Items (30)

A novel classical and quantum cryptographic scheme for data encryptionThe matrix reloaded: multiplication strategies in FrodoKEMQuantum algorithms for variants of average-case lattice problems via filteringAnonymous, robust post-quantum public key encryptionMultitarget Decryption Failure Attacks and Their Application to Saber and KyberGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionSecurity enhancement method using shortened error correcting codesOne-hot conversion: towards faster table-based A2B conversionRandomized half-ideal cipher on groups with applications to UC (a)PAKEPost-quantum anonymity of KyberA thorough treatment of highly-efficient NTRU instantiations\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionHigher-order masked SaberFormal verification of Saber's public-key encryption scheme in easycryptFault-enabled chosen-ciphertext attacks on KyberA performance evaluation of IPsec with post-quantum cryptographyError correction and ciphertext quantization in lattice cryptographyThe direction of updatable encryption does not matter muchRecovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABERBI-NTRU Encryption Schemes: Two New Secure Variants of NTRUSaber on ESP32Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesNumber theoretic transform: generalization, optimization, concrete analysis and applicationsShorter lattice-based zero-knowledge proofs via one-time commitmentsSaberPractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencyRounding in the ringsPractical post-quantum password-authenticated key exchange based-on module-latticeImplementation of lattice trapdoors on modules and applications


Uses Software



This page was built for publication: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM