Lattice-Based Schemes
- A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy: [M20]
- A Practical Key Exchange for the Internet using Lattice Cryptography: [S15]
- Achieving One-Round Password-based Authenticated Key Exchange over Lattices: [LW19]
- An Analysis of Lattice-Based Key Exchange Protocols: [BBR16]
- CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM: [BDK18]
- CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme: [DKL18]
- Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols: [BBR18]
- Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol: [GDS19]
- Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber: [EGM20]
- Constant-Round Group Key Exchange from the Ring-LWE Assumption: [ADG19]
- Definition of a quantum computer resistant encryption scheme: [DHA21]
- Durandal: A Rank Metric Based Signature Scheme: [ABG19]
- Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy.: [BCO20]
- Error-Correcting Codes for Lattice-Based Key Exchange: [F18]
- Faster Kyber and Saber via a Generic Fujisaki-Okamoto Transform for Multi-User Security in the QROM: [JKE21]
- Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE: [BCD16]
- Generating cryptographically-strong random lattice bases: [BM21]
- High-Speed Key Encapsulation from NTRU: [HRS17]
- Implementing RLWE-based Schemes Using an RSA Co-Processor: [AHH18]
- Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card: [E20]
- Lattice-Based Key Sharing Schemes: A Survey: [RHC21]
- LegRoast: Efficient post-quantum signatures from the Legendre PRF.: [Bd20]
- Leighton-Micali Hash-Based Signatures: [MCF19]
- Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon: [TAM21]
- NTRU-KE: A Lattice-based Public Key Exchange Protocol: [LL13]
- On Removing Rejection Conditions in Practical Lattice-Based Signatures: [BCM21]
- Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol: [DGG18]
- PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model: [JGH20]
- Polynomial Multiplication in NTRU Prime: [ACC21]
- Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem: [ZTJ19]
- Post-Quantum Lattice-Based Cryptography Implementations: A Survey: [NDR19]
- Post-quantum Authenticated Key Exchange from Ideal Lattices: [ZZD14]
- Post-quantum Key Exchange—A New Hope: [ADP16]
- Practical CCA2-Secure and Masked Ring-LWE Implementation: [OSP16]
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World: [DAL17]
- Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error: [C17]
- Reconciliation based key exchange schemes using lattices: a review: [DBK21]
- Research on Key Exchange Protocol Based on LWE: [DJC19]
- Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM: [DKS18]
- Software and Hardware Implementation of Lattice-based Cryptography Schemes: [NDR17]
- Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor: [GMR20]
- The Lattice-Based Digital Signature Scheme qTESLA: [ABB20]
- Zalcon: an alternative FPA-free NTRU sampler for Falcon: [FGR21]
- spKEX: An optimized lattice-based key-exchange: [BGR17]
Last modified February 12, 2022