Browse > Article

양자 내성 암호 최신 소프트웨어 구현 동향  

Park, Tae-hwan (부산대학교 전기전자컴퓨터공학과)
Seo, Hwa-jeong (한성대학교 IT융합공학부)
Lee, Ga-ram (부산대학교 전기전자컴퓨터공학과)
Kim, Ho-won (부산대학교 전기전자컴퓨터공학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z. Liu, H. Seo, J. GroBschadl, and H. Kim, "Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes", IEEE Transactions on Information Forensics and Security, 11(7), pp. 1385-1397, 2016.   DOI
2 Hwajung Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, and Howon Kim, "Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors", International Conference on Information Security and Cryptology. Springer, Cham, pp. 1-14, 2017.
3 Bernstein, Daniel J., Tung Chou, and Peter Schwabe. "McBits: fast constant-time code-based cryptography." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, pp. 250-272, 2013.
4 Misoczki, R., Tillich, J. P., Sendrier, N., & Barreto, P. S. "MDPC-McEliece: New McEliece variants from moderate density parity-check codes." Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on. IEEE, pp. 2069-2073, 2013.
5 Heyse, Stefan, Ingo Von Maurich, and Tim Guneysu. "Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices." International Workshop on Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, pp.273-292, 2013.
6 Von Maurich, Ingo, and Tim Guneysu. "Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices." PQCrypto 2014, pp. 266-282, 2014
7 Maurich, Ingo Von, Tobias Oder, and Tim Guneysu. "Implementing QC-MDPC McEliece Encryption." ACM Transactions on Embedded Computing Systems (TECS) 14.3 (2015): 44., pp. 1-25, 2015
8 Chou, Tung. "QcBits: constant-time small-key code-based cryptography." International Conference on Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, 2016.(0), pp. 280-300, 2016
9 Barreto, P. S., Gueron, S., Guneysu, T., Misoczki, R., Persichetti, E., Sendrier, N., & Tillich, J. P. "CAKE: Code-Based Algorithm for Key Encapsulation." IMA International Conference on Cryptography and Coding. Springer, Cham, 2017.(0), pp. 207-226, 2017
10 Chou, Tung. "McBits revisited." International Conference on Cryptographic Hardware and Embedded Systems. Springer, Cham, pp. 213-231, 2017.
11 A. Petzoldt, M-S Chen, B-Y Yang, C. Tao, and J. Ding, "Design Principles for HFEv- based Multivariate Signature Schemes", Advances in Cryptology: ASIACRYPT2015, LNCS 9452, pp. 311-334, 2015.
12 D. H. Duong, T. Yasuda, A. Petzoldt, Y. Wang and T. Takagi, "Revisiting the Cubic UOV Signature Scheme", ICISC 2016, LNCS 10157, pp. 223-238, 2016.
13 Petzoldt, Albrecht, Alan Szepieniec, and Mohamed Saied Emam Mohamed. "A Practical Multivariate Blind Signature Scheme." IACR Cryptology ePrint Archive 2017 (2017): 131., pp. 1-21, 2017
14 Chen, M. S., Li, W. D., Peng, B. Y., Yang, B. Y., & Cheng, C. M. "Implementing 128-bit Secure MPKC Signatures." Cryptology ePrint Archive, Report 2017/636, pp. 1-32, 2017.
15 Peng, Zhiniang, and Shaohua Tang. "Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation." IEEE Access 5 (2017), pp. 11877-11886., 2017   DOI
16 De Feo, L., Jao, D., Plut, J., "Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.", Journal of Mathematical Cryptology 8(3), pp. 209-247, September 2014
17 Yoo, Y., Azarderakhsh, R., Jalali, A., Jao, D., & Soukharev, V. "A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies." IACR Cryptology ePrint Archive 2017 (2017): 186., pp. 1-18, 2017
18 Costello, C., Longa, P., Naehrig, M., "Efficient Algorithms for Supersingular Isogeny Diffie-Hellman", Advances in Cryptology- CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer Berlin Heidelberg, Berlin, Heidelberg (2016), pp. 572-601, 2016
19 Azarderakhsh, R., Jao, D., Kalach, K., Koziel, B., Leonardi, C., "Key compression for isogeny-based cryptosystems.", Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography. AsiaPKC '16, New York, NY, USA, ACM, pp. 1-10, 2016
20 Koziel, B., Jalali, A., Azarderakhsh, R., Jao, D., & Mozaffari-Kermani, M. "NEON-SIDH: efficient implementation of supersingular isogeny Diffie-Hellman key exchange protocol on ARM." International Conference on Cryptology and Network Security. Springer International Publishing, pp. 88-103, 2016
21 Costello, C., Jao, D., Longa, P., Naehrig, M., Renes, J., & Urbanik, D. "Efficient compression of SIDH public keys." Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Cham, pp. 279-706, 2017.
22 Bernstein, D. J., Hopwood, D., Hülsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., & Wilcox-O'Hearn, Z. "SPHINCS: practical stateless hash-based signatures." Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp. 368-397, 2015.
23 Hulsing, Andreas, Joost Rijneveld, and Peter Schwabe. "ARMed SPHINCS." Public-Key Cryptography-PKC 2016. Springer Berlin Heidelberg, 2016, pp. 446-470, 2016
24 Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M., & Stehle, D. "High-speed key encapsulation from NTRU." International Conference on Cryptographic Hardware and Embedded Systems, pp. 232-252. Springer, Cham, 2017.
25 Gueron, Shay, and Nicky Mouha. "SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security." Cryptology ePrint Archive, Report 2017/645, pp. 1-12, 2017
26 Kolbl, Stefan. "Putting Wings on SPHINCS." PQCrypto 2017, pp. 1-20, 2017
27 Son, Yongha. "A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE." Information Security and Cryptology--ICISC 2016: 19th International Conference, Seoul, South Korea, November 30--December 2, 2016, Revised Selected Papers. Vol. 10157. Springer, 2017.
28 Cheon, J. H., Kim, D., Lee, J., & Song, Y. S. "Lizard: Cut off the Tail!//Practical Post- Quantum Public-Key Encryption from LWE and LWR." IACR Cryptology ePrint Archive 2016 (2016): 1126.
29 Bos, Joppe, et al. "CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM." IACR Cryptology ePrint Archive 2017 (2017): 634.
30 Guillen, O. M., Poppelmann, T., Mera, J. M. B., Bongenaar, E. F., Sigl, G., Sepulveda, J. (2017). "Towards post-quantum security for IoT endpoints with NTRU", In 2017 Design, Automation & Test in Europe Conference & Exhibition(DATE), IEEE, pp. 698-703.
31 T. Oder, T. Poppelmann, and T. Guneysu. "Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices", 51st Annual Design Automation Conference(DAC), pp. 1-6, 2014.
32 R. De Clercq, S. S. Roy, F. Vercauteren, and I. Verbauwhede, "Efficient Software Implementation of Ring-LWE Encryption", 18th Design, Automation & Test in Europe Conference & Exhibition, pp. 339-344, 2015.
33 T. Poppelmann, T. Oder, and T. Guneysu, "High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers", In International Conference on Cryptology and Information Security in Latin America, pages 346-365. Springer, 2015.
34 Z. Liu, R. Azarderakhsh, H. Kim, and H. Seo, "Efficient software implementation of Ring- LWE encryption on IoT processors", IEEE Transactions on Computers, pp. 1-11, 2017.
35 Z. Liu, H. Seo, S. S. Roy, J. GroBschadl, H. Kim, and I. Verbauwhede, "Efficient Ring-LWE encryption on 8-bit AVR processors", In International Workshop on Cryptographic Hardware and Embedded Systems, pages 663-682. Springer, 2015.
36 Z. Liu, T. Poppelmann, T. Oder, H. Seo, S. S. Roy, T. Guneysu, J. Groschadl, H. Kim, and I. Verbauwhede, "High-performance ideal latticebased cryptography on 8-bit AVR microcontrollers", ACM Transactions on Embedded Computing Systems (TECS), 16(4):117, pp. 1-20, 2017.