FrodoKEM
From MaRDI portal
Software:46969
No author found.
Source code repository: https://github.com/Microsoft/PQCrypto-LWEKE
Related Items (24)
Lower bounds on lattice sieving and information set decoding ⋮ Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem ⋮ A novel classical and quantum cryptographic scheme for data encryption ⋮ Key mismatch attack on ThreeBears, Frodo and Round5 ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography ⋮ The matrix reloaded: multiplication strategies in FrodoKEM ⋮ A note on the concrete hardness of the shortest independent vector in lattices ⋮ Anonymous, robust post-quantum public key encryption ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants ⋮ Estimation of the hardness of the learning with errors problem with a restricted number of samples ⋮ On the asymptotic complexity of solving LWE ⋮ Just Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP) ⋮ Assessing the feasibility of single trace power analysis of Frodo ⋮ Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ DAGS: key encapsulation using dyadic GS codes ⋮ Unnamed Item ⋮ A framework for cryptographic problems from linear algebra ⋮ Verifying solutions to LWE with implications for concrete security ⋮ Limits on the efficiency of (ring) LWE-based non-interactive key exchange ⋮ Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency ⋮ Strongly leakage resilient authenticated key exchange, revisited
This page was built for software: FrodoKEM