Status report on the second round of the NIST post-quantum cryptography standardization process

@inproceedings{Moody2020StatusRO,
  title={Status report on the second round of the NIST post-quantum cryptography standardization process},
  author={Dustin Moody and Gorjan Alagic and Daniel Apon and David A. Cooper and Quynh Dang and John Kelsey and Yi-Kai Liu and Carl A. Miller and Ren{\'e} Peralta and Ray A. Perlner and Angela Robinson and Daniel Smith-Tone and Jacob Alperin-Sheriff},
  year={2020}
}

Applying a cryptographic metric to post-quantum lattice-based signature algorithms

TLDR
This paper applies a metric taxonomy, produced by earlier studies, to two NIST third round finalist digital signature algorithms Dilithium and Falcon in order to asses the effectiveness and extensiveness of the metric.

Design and Evaluation of Bit-sliced Neural Network and Post-Quantum Implementations

TLDR
This thesis investigates both these applications of bit-slicing technique in two different domains: Neural Networks, by improving the performance of its most common operation, Matrix Multiplication, and Post-Quantum Lattice-based algorithms, by protecting its key operation that is Number-Theoretic Transform (NTT) using bit-Sliced spatial redundancy against fault injection attacks.

Signature Correction Attack on Dilithium Signature Scheme

TLDR
A novel Signature Correction Attack is introduced which not only applies to the deterministic version but also to the randomized version of Dilithium and is effective even on constant-time implementations using AVX2 instructions.

An Evolutionary Pathway for the Quantum Internet Relying on Secure Classical Repeaters

TLDR
The first experimental demonstration of a secure classical-repeater-based hybrid quantum network constructed by a serial concatenation of an optical fiber and free-space communication link is presented, indicating that secure repeater networks may indeed be constructed using existing technology and continue to support a seamless evolutionary pathway to the future Qinternet of quantum computers.

CARAF: Crypto Agility Risk Assessment Framework

TLDR
The proposed framework can be used by organizations to determine an appropriate mitigation strategy commensurate with their risk tolerance and is demonstrated with a case study of quantum computing and related threats to cryptography in the context of TLS for Internet of Things.

Implementation and Analysis of the NTRU Algorithm in Java

TLDR
A Java implementation of the latest version of the NTRU algorithm, which is an important candidate for post-quantum cryptography standardization, is described, and which algorithms are best-suited for the implementation of arithmetic operations are clarified.

EFFICIENT IMPLEMENTATION OF LATTICE-BASED SCHEMES A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF APPLIED MATHEMATICS OF MIDDLE EAST TECHNICAL UNIVERSITY BY YUSUF ALPER BILGIN IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN CRYPTOGRAPHY

  • Computer Science
  • 2020
TLDR
This thesis proposes an efficient and compact variant of NEWHOPE, one of the most efficient second-round candidates of the NIST post-quantum standardization project, and heavily uses recent advances on Number.

Post-Quantum Cryptography: An Introductory Overview and Implementation Challenges of Quantum-Resistant Algorithms

TLDR
The authors provide an overview of challenges faced by the research community and elaborate the advancements in addressing post-quantum threats, and refer to a well- established model in cybersecurity – the McCumber Cube as categorization scheme for potential obstacles.

SoK: How (not) to Design and Implement Post-Quantum Cryptography

TLDR
This study systematizes the current state of knowledge on post-quantum cryptography and adopts a transversal point of view and centers this study around three areas: paradigms, implementation, and deployment.

Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms

TLDR
A practical signature scheme based on the alternating trilinear form equivalence problem, inspired by the Goldreich-Micali-Wigderson's zero-knowledge protocol for graph isomorphism, which can be served as an alternative candidate for the NIST’s post-quantum digital signatures.
...