Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

  title={Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE},
  author={Joppe W. Bos and Craig Costello and L{\'e}o Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila},
  booktitle={ACM Conference on Computer and Communications Security},
Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to quantum computers. Following increasing interest from both companies and government agencies in building quantum computers, a number of works have proposed instantiations of practical post-quantum key exchange protocols based on hard problems in ideal lattices, mainly based on the Ring Learning With Errors (R-LWE) problem. While ideal lattices facilitate major efficiency and storage benefits… CONTINUE READING
Highly Influential
This paper has highly influenced 27 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 142 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 95 extracted citations

Universally composable oblivious transfer from ideal lattice

Frontiers of Computer Science • 2018
View 9 Excerpts
Highly Influenced

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

ACM Trans. Embedded Comput. Syst. • 2017
View 4 Excerpts
Highly Influenced

Round5: Compact and Fast Post-Quantum Public-Key Encryption

IACR Cryptology ePrint Archive • 2018
View 7 Excerpts
Highly Influenced

Cryptographic Hardware and Embedded Systems – CHES 2017

Lecture Notes in Computer Science • 2017
View 10 Excerpts
Highly Influenced

142 Citations

Citations per Year
Semantic Scholar estimates that this publication has 142 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-4 of 4 references

Lattice Cryptography for the Internet

PQCrypto • 2014
View 15 Excerpts
Highly Influenced

BKZ 2.0: Better Lattice Security Estimates

View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…