Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
From MaRDI portal
Publication:1653248
DOI10.1007/978-3-319-89339-6_16zbMath1423.94065OpenAlexW2796314191MaRDI QIDQ1653248
Sujoy Sinha Roy, Jan-Pieter D'Anvers, Angshuman Karmakar, Frederik Vercauteren
Publication date: 17 July 2018
Full work available at URL: http://pure-oai.bham.ac.uk/ws/files/70656269/Saber._Module_LWR.pdf
Related Items (30)
A novel classical and quantum cryptographic scheme for data encryption ⋮ The matrix reloaded: multiplication strategies in FrodoKEM ⋮ Quantum algorithms for variants of average-case lattice problems via filtering ⋮ Anonymous, robust post-quantum public key encryption ⋮ Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber ⋮ Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption ⋮ Security enhancement method using shortened error correcting codes ⋮ One-hot conversion: towards faster table-based A2B conversion ⋮ Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ Post-quantum anonymity of Kyber ⋮ A thorough treatment of highly-efficient NTRU instantiations ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Higher-order masked Saber ⋮ Formal verification of Saber's public-key encryption scheme in easycrypt ⋮ Fault-enabled chosen-ciphertext attacks on Kyber ⋮ A performance evaluation of IPsec with post-quantum cryptography ⋮ Error correction and ciphertext quantization in lattice cryptography ⋮ The direction of updatable encryption does not matter much ⋮ Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER ⋮ BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU ⋮ Saber on ESP32 ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes ⋮ Number theoretic transform: generalization, optimization, concrete analysis and applications ⋮ Shorter lattice-based zero-knowledge proofs via one-time commitments ⋮ Saber ⋮ Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency ⋮ Rounding in the rings ⋮ Practical post-quantum password-authenticated key exchange based-on module-lattice ⋮ Implementation of lattice trapdoors on modules and applications
Uses Software
This page was built for publication: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM