Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Batch Signatures, Revisited

    We revisit batch signatures (previously considered in a draft RFC and used in multiple recent works), where a single, potentially expensive, “inner” digital signature authenticates a Merkle tree constructed fr...

    Carlos Aguilar-Melchor, Martin R. Albrecht in Topics in Cryptology – CT-RSA 2024 (2024)

  2. No Access

    Chapter and Conference Paper

    Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7

    This paper presents an analysis of the two lattice-based digital signature schemes, Dilithium and Falcon, which have been chosen by NIST for standardisation, on the ARM Cortex M7 using the STM32F767ZI NUCLEO-1...

    James Howe, Bas Westerbaan in Progress in Cryptology - AFRICACRYPT 2023 (2023)

  3. No Access

    Chapter and Conference Paper

    The Return of the SDitH

    This paper presents a code-based signature scheme based on the well-known syndrome decoding (SD) problem. The scheme builds upon a recent line of research which uses the Multi-Party-Computation-in-the-Head (MP...

    Carlos Aguilar-Melchor, Nicolas Gama, James Howe in Advances in Cryptology – EUROCRYPT 2023 (2023)

  4. No Access

    Chapter and Conference Paper

    Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC

    While hardware implementations allow the production of highly efficient and performance-oriented designs, exploiting features such as parallelization, their longer time to code and implement often bottlenecks ...

    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion in Code-Based Cryptography (2023)

  5. No Access

    Chapter and Conference Paper

    SoK: How (not) to Design and Implement Post-quantum Cryptography

    Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel...

    James Howe, Thomas Prest, Daniel Apon in Topics in Cryptology – CT-RSA 2021 (2021)

  6. No Access

    Chapter and Conference Paper

    Isochronous Gaussian Sampling: From Inception to Implementation

    Gaussian sampling over the integers is a crucial tool in lattice-based cryptography, but has proven over the recent years to be surprisingly challenging to perform in a generic, efficient and provable secure m...

    James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi in Post-Quantum Cryptography (2020)