Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Mask Compression: High-Order Masking on Memory-Constrained Devices

    Masking is a well-studied method for achieving provable security against side-channel attacks. In masking, each sensitive variable is split into d randomized shares, and computations are performed with those shar...

    Markku-Juhani O. Saarinen, Mélissa Rossi in Selected Areas in Cryptography – SAC 2023 (2024)

  2. No Access

    Article

    Masking the GLP Lattice-Based Signature Scheme at Any Order

    Recently, numerous physical attacks have been demonstrated against lattice-based schemes, often exploiting their unique properties such as the reliance on Gaussian distributions, rejection sampling and FFT-bas...

    Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque in Journal of Cryptology (2023)

  3. No Access

    Article

    On the algebraic immunity—resiliency trade-off, implications for Goldreich’s pseudorandom generator

    Goldreich’s pseudorandom generator is a well-known building block for many theoretical cryptographic constructions from multi-party computation to indistinguishability obfuscation. Its unique efficiency comes ...

    Aurélien Dupin, Pierrick Méaux, Mélissa Rossi in Designs, Codes and Cryptography (2023)

  4. No Access

    Chapter and Conference Paper

    Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE

    Constructing advanced cryptographic primitives such as obfuscation or broadcast encryption from standard hardness assumptions in the post quantum regime is an important area of research, which has met with lim...

    Shweta Agrawal, Mélissa Rossi, Anshu Yadav in Advances in Cryptology – CRYPTO 2023 (2023)

  5. No Access

    Chapter and Conference Paper

    GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges

    Password Authenticated Key Exchange (PAKE) have become a key building block in many security products as they provide interesting efficiency/security trade-offs. Indeed, a PAKE allows to dispense with the heavy p...

    Hugo Beguinet, Céline Chevalier in Applied Cryptography and Network Security (2023)

  6. No Access

    Chapter and Conference Paper

    Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon

    This work describes the Mitaka signature scheme: a new hash-and-sign signature scheme over NTRU lattices which can be seen as a variant of NIST finalist Falcon. It achieves comparable efficiency but is considerab...

    Thomas Espitau, Pierre-Alain Fouque in Advances in Cryptology – EUROCRYPT 2022 (2022)

  7. Chapter and Conference Paper

    (One) Failure Is Not an Option: Bootstrap** the Search for Failures in Lattice-Based Encryption Schemes

    Lattice-based encryption schemes are often subject to the possibility of decryption failures, in which valid encryptions are decrypted incorrectly. Such failures, in large number, leak information about the se...

    Jan-Pieter D’Anvers, Mélissa Rossi in Advances in Cryptology – EUROCRYPT 2020 (2020)

  8. No Access

    Chapter and Conference Paper

    An Efficient and Provable Masked Implementation of qTESLA

    Now that the NIST’s post-quantum cryptography competition has entered in its second phase, the time has come to focus more closely on practical aspects of the candidates. While efficient implementations of the...

    François Gérard, Mélissa Rossi in Smart Card Research and Advanced Applications (2020)

  9. No Access

    Chapter and Conference Paper

    Isochronous Gaussian Sampling: From Inception to Implementation

    Gaussian sampling over the integers is a crucial tool in lattice-based cryptography, but has proven over the recent years to be surprisingly challenging to perform in a generic, efficient and provable secure m...

    James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi in Post-Quantum Cryptography (2020)

  10. Chapter and Conference Paper

    LWE with Side Information: Attacks and Concrete Security Estimation

    We propose a framework for cryptanalysis of lattice-based schemes, when side information—in the form of “hints”—about the secret and/or error is available. Our framework generalizes the so-called primal lattic...

    Dana Dachman-Soled, Léo Ducas, Hui**g Gong in Advances in Cryptology – CRYPTO 2020 (2020)

  11. No Access

    Chapter and Conference Paper

    Assessment of the Key-Reuse Resilience of NewHope

    NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization. In this paper, we stu...

    Aurélie Bauer, Henri Gilbert, Guénaël Renault in Topics in Cryptology – CT-RSA 2019 (2019)

  12. Chapter and Conference Paper

    Masking the GLP Lattice-Based Signature Scheme at Any Order

    Recently, numerous physical attacks have been demonstrated against lattice-based schemes, often exploiting their unique properties such as the reliance on Gaussian distributions, rejection sampling and FFT-bas...

    Gilles Barthe, Sonia Belaïd, Thomas Espitau in Advances in Cryptology – EUROCRYPT 2018 (2018)

  13. Chapter and Conference Paper

    On the Concrete Security of Goldreich’s Pseudorandom Generator

    Local pseudorandom generators allow to expand a short random string into a long pseudo-random string, such that each output bit depends on a constant number d of input bits. Due to its extreme efficiency features...

    Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux in Advances in Cryptology – ASIACRYPT 2018 (2018)

  14. Chapter and Conference Paper

    A Side-Channel Assisted Cryptanalytic Attack Against QcBits

    QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum computer attacks. It is a constant-time implementation for a quasi-cyclic moderate density parity check (...

    Mélissa Rossi, Mike Hamburg, Michael Hutter in Cryptographic Hardware and Embedded System… (2017)