Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    \(\mathsf {\textsf{Plover}}\) : Masking-Friendly Hash-and-Sign Lattice Signatures

    We introduce a toolkit for transforming lattice-based hash-and-sign signature schemes into masking-friendly signatures secure in the t-probing model. Until now, efficiently masking lattice-based hash-and-sign sch...

    Muhammed F. Esgin, Thomas Espitau, Guilhem Niot in Advances in Cryptology – EUROCRYPT 2024 (2024)

  2. No Access

    Chapter and Conference Paper

    Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions

    Threshold signatures improve both availability and security of digital signatures by splitting the signing key into N shares handed out to different parties. Later on, any subset of at least T parties can coopera...

    Rafael del Pino, Shuichi Katsumata, Mary Maller in Advances in Cryptology – EUROCRYPT 2024 (2024)

  3. No Access

    Chapter and Conference Paper

    A Key-Recovery Attack Against Mitaka in the t-Probing Model

    Mitaka is a lattice-based signature proposed at Eurocrypt 2022. A key advertised feature of Mitaka is that it can be masked at high orders efficiently, making it attractive in scenarios where side-channel attacks...

    Thomas Prest in Public-Key Cryptography – PKC 2023 (2023)

  4. No Access

    Article

    An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable

    The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others. The Signal protocol consists of tw...

    Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski in Journal of Cryptology (2022)

  5. Chapter and Conference Paper

    Exact Lattice Sampling from Non-Gaussian Distributions

    We propose a new framework for (trapdoor) sampling over lattices. Our framework can be instantiated in a number of ways. It allows for example to sample from uniform, affine and “product affine” distributions....

    Maxime Plançon, Thomas Prest in Public-Key Cryptography – PKC 2021 (2021)

  6. Chapter and Conference Paper

    An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable

    The Signal protocol is a secure instant messaging protocol that underlies the security of numerous applications such as WhatsApp, Skype, Facebook Messenger among many others. The Signal protocol consists of tw...

    Keitaro Hashimoto, Shuichi Katsumata in Public-Key Cryptography – PKC 2021 (2021)

  7. No Access

    Chapter and Conference Paper

    SoK: How (not) to Design and Implement Post-quantum Cryptography

    Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel...

    James Howe, Thomas Prest, Daniel Apon in Topics in Cryptology – CT-RSA 2021 (2021)

  8. No Access

    Chapter and Conference Paper

    Cryptographic Divergences: New Techniques and New Applications

    In the recent years, some security proofs in cryptography have known significant improvements by replacing the statistical distance with alternative divergences. We continue this line of research, both at a th...

    Marc Abboud, Thomas Prest in Security and Cryptography for Networks (2020)

  9. No Access

    Chapter and Conference Paper

    Isochronous Gaussian Sampling: From Inception to Implementation

    Gaussian sampling over the integers is a crucial tool in lattice-based cryptography, but has proven over the recent years to be surprisingly challenging to perform in a generic, efficient and provable secure m...

    James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi in Post-Quantum Cryptography (2020)

  10. Chapter and Conference Paper

    Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats

    Many advanced lattice based cryptosystems require to sample lattice points from Gaussian distributions. One challenge for this task is that all current algorithms resort to floating-point arithmetic (FPA) at s...

    Léo Ducas, Steven Galbraith, Thomas Prest in Advances in Cryptology – EUROCRYPT 2020 (2020)

  11. Chapter and Conference Paper

    Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications

    A multi-recipient key encapsulation mechanism, or \(\mathsf {m}\mathsf {KEM}\) ...

    Shuichi Katsumata, Kris Kwiatkowski in Advances in Cryptology – ASIACRYPT 2020 (2020)

  12. No Access

    Chapter and Conference Paper

    More Efficient Algorithms for the NTRU Key Generation Using the Field Norm

    NTRU lattices [13] are a class of polynomial rings which allow for compact and efficient representations of the lattice basis, thereby offering very good performance characteristics for the asymmetric algorithms ...

    Thomas Pornin, Thomas Prest in Public-Key Cryptography – PKC 2019 (2019)

  13. No Access

    Chapter and Conference Paper

    Unifying Leakage Models on a Rényi Day

    In the last decade, several works have focused on finding the best way to model the leakage in order to...

    Thomas Prest, Dahmun Goudarzi, Ange Martinelli in Advances in Cryptology – CRYPTO 2019 (2019)

  14. No Access

    Chapter and Conference Paper

    Grafting Trees: A Fault Attack Against the SPHINCS Framework

    Because they require no assumption besides the preimage or collision resistance of hash functions, hash-based signatures are a unique and very attractive class of post-quantum primitives. Among them, the schem...

    Laurent Castelnovi, Ange Martinelli, Thomas Prest in Post-Quantum Cryptography (2018)

  15. Chapter and Conference Paper

    Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence

    The Rényi divergence is a measure of divergence between distributions. It has recently found several applications in lattice-based cryptography. The contribution of this paper is twofold.

    Thomas Prest in Advances in Cryptology – ASIACRYPT 2017 (2017)

  16. Chapter and Conference Paper

    Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices

    A procedure for sampling lattice vectors is at the heart of many lattice constructions, and the algorithm of Klein (SODA 2000) and Gentry, Peikert, Vaikuntanathan (STOC 2008) is currently the one that produces...

    Vadim Lyubashevsky, Thomas Prest in Advances in Cryptology -- EUROCRYPT 2015 (2015)

  17. Chapter and Conference Paper

    Efficient Identity-Based Encryption over NTRU Lattices

    Efficient implementations of lattice-based cryptographic schemes have been limited to only the most basic primitives like encryption and digital signatures. The main reason for this limitation is that at the c...

    Léo Ducas, Vadim Lyubashevsky, Thomas Prest in Advances in Cryptology – ASIACRYPT 2014 (2014)