NIST Post-Quantum Cryptography Standardization
Post-Quantum Cryptography Standardization[1] is a program and competition by NIST to update their standards to include post-quantum cryptography.[2] It was announced at PQCrypto 2016.[3] 23 signature schemes and 59 encryption/KEM schemes were submitted by the initial submission deadline at the end of 2017[4] of which 69 total were deemed complete and proper and participated in the first round. Seven of these, of which 3 are signature schemes, have advanced to the third round, which was announced on July 22, 2020.
Background
Academic research on the potential impact of quantum computing dates back to at least 2001.[5] A NIST published report from April 2016 cites experts that acknowledge the possibility of quantum technology to render the commonly used RSA algorithm insecure by 2030.[6] As a result, a need to standardize quantum-secure cryptographic primitives was pursued. Since most symmetric primitives are relatively easy to modify in a way that makes them quantum resistant, efforts have focused on public-key cryptography, namely digital signatures and key encapsulation mechanisms. In December 2016 NIST initiated a standardization process by announcing a call for proposals.[7]
The competition is now in its third round out of expected four, where in each round some algorithms are discarded and others are studied more closely. NIST hopes to publish the standardization documents by 2024, but may speed up the process if major breakthroughs in quantum computing are made.
It is currently undecided whether the future standards be published as FIPS or as NIST Special Publication (SP).
Round one
Under consideration were:[8]
(strikethrough means it had been withdrawn)
Type | PKE/KEM | Signature | Signature & PKE/KEM |
---|---|---|---|
Lattice |
|
|
|
Code-based |
|
|
|
Hash-based |
|
||
Multivariate |
|
|
|
Braid group |
|
||
Supersingular elliptic curve isogeny | |||
Satirical submission | |||
Other |
|
|
Round one submissions published attacks
- Guess Again by Lorenz Panny [14]
- RVB by Lorenz Panny[15]
- RaCoSS by Daniel J. Bernstein, Andreas Hülsing, Tanja Lange and Lorenz Panny[16]
- HK17 by Daniel J. Bernstein and Tanja Lange[17]
- SRTPI by Bo-Yin Yang[18]
- WalnutDSA
- DRS by Yang Yu and Léo Ducas [21]
- DAGS by Elise Barelli and Alain Couvreur[22]
- Edon-K by Matthieu Lequesne and Jean-Pierre Tillich[23]
- RLCE by Alain Couvreur, Matthieu Lequesne, and Jean-Pierre Tillich[24]
- Hila5 by Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange and Lorenz Panny[25]
- Giophantus by Ward Beullens, Wouter Castryck and Frederik Vercauteren[26]
- RankSign by Thomas Debris-Alazard and Jean-Pierre Tillich [27]
- McNie by Philippe Gaborit;[28] Terry Shue Chien Lau and Chik How Tan [29]
Round two
Candidates moving on to the second round were announced on January 30, 2019. They are:[30]
Type | PKE/KEM | Signature |
---|---|---|
Lattice | ||
Code-based | ||
Hash-based |
| |
Multivariate | ||
Supersingular elliptic curve isogeny | ||
Zero-knowledge proofs |
|
Round three
On July 22, 2020, NIST announced seven finalists ("first track"), as well as eight alternate algorithms ("second track"). The first track contains the algorithms which appear to have the most promise, and will be considered for standardization at the end of the third round. Algorithms in the second track could still become part of the standard, after the third round ends.[51] NIST expects some of the alternate candidates to be considered in a fourth round. NIST also suggests it may re-open the signature category for new schemes proposals in the future.[52]
On June 7–9, 2021, NIST conducted the third PQC standardization conference, virtually.[53] The conference included candidates' updates and discussions on implementations, on performances, and on security issues of the candidates. A small amount of focus was spent on intellectual property concerns.
Finalists
Type | PKE/KEM | Signature |
---|---|---|
Lattice |
|
|
Code-based |
|
|
Multivariate |
|
Alternate candidates
Type | PKE/KEM | Signature |
---|---|---|
Lattice |
|
|
Code-based | ||
Hash-based |
| |
Multivariate |
| |
Supersingular elliptic curve isogeny | ||
Zero-knowledge proofs |
|
Intellectual property concerns
After NIST's announcement regarding the finalists and the alternate candidates, various intellectual property concerns were voiced, notably surrounding lattice-based schemes such as Kyber and NewHope. NIST holds signed statements from submitting groups clearing any legal claims, but there is still a concern that third parties could raise claims. NIST claims that they will take such considerations into account while picking the winning algorithms.[54]
Round three submissions published attacks
- Rainbow: by Ward Beullens on a classical computer[55]
Adaptations
During this round, some candidates have shown to be vulnerable to some attack vectors. It forces these candidates to adapt accordingly:
- CRYSTAL-Kyber and SABER
- may change the nested hashes used in their proposals in order for their security claims to hold.[56]
- FALCON
- side channel attack by . A masking may be added in order to resist the attack. This adaptation affects performance and should be considered while standardizing.[57]
Selected Algorithms 2022
On July 5, 2022, NIST announced the first group of winners from its six-year competition.[58][59]
Type | PKE/KEM | Signature |
---|---|---|
Lattice | ||
Hash-based |
Round four
On July 5, 2022, NIST announced four candidates for PQC Standardization Round 4.[60]
Type | PKE/KEM |
---|---|
Code-based | |
Supersingular elliptic curve isogeny |
Round four submissions published attacks
- SIKE: by Wouter Castryck and Thomas Decru on a classical computer[62]
Additional Digital Signature Schemes Round One
NIST received 50 submissions and deemed 40 to be complete and proper according to the submission requirements.[63] Under consideration are:[64]
(strikethrough means it has been withdrawn)
Type | Signature |
---|---|
Lattice | |
Code-based | |
MPC-in-the-Head | |
Multivariate |
|
Supersingular elliptic curve isogeny |
|
Symmetric-based | |
Other |
|
Additional signature round one submissions published attacks
- 3WISE by Daniel Smith-Tone[81]
- EagleSign by Mehdi Tibouchi[95]
- KAZ-SIGN by Daniel J. Bernstein;[96] Scott Fluhrer[97]
- Xifrat1-Sign.I by Lorenz Panny[98]
- eMLE-Sig 2.0 by Mehdi Tibouchi[99]
- HPPC by Ward Beullens[100];Pierre Briaud, Maxime Bros, and Ray Perlner[101]
- ALTEQ by Markku-Juhani O. Saarinen[102] (implementation only?)
- Biscuit by Charles Bouillaguet[103]
- MEDS by Markku-Juhani O. Saarinen and Ward Beullens[104] (implementation only)
- FuLeeca by Felicitas Hörmann and Wessel van Woerden[105]
- LESS by the LESS team (implementation only)[106]
- DME-Sign by Markku-Juhani O. Saarinen[107] (implementation only?); Pierre Briaud, Maxime Bros, Ray Perlner, and Daniel Smith-Tone[108]
- EHTv3 by Eamonn Postlethwaite and Wessel van Woerden;[109] Keegan Ryan and Adam Suhl[110]
- Enhanced pqsigRM by Thomas Debris-Alazard, Pierre Loisel and Valentin Vasseur;[111] Pierre Briaud, Maxime Bros, Ray Perlner and Daniel Smith-Tone[112]
- HAETAE by Markku-Juhani O. Saarinen[113] (implementation only?)
- HuFu by Markku-Juhani O. Saarinen[114]
- SDitH by Kevin Carrier and Jean-Pierre Tillich;[115] Kevin Carrier, Valérian Hatey, and Jean-Pierre Tillich[116]
- VOX by Hiroki Furue and Yasuhiko Ikematsu[117]
- AIMer by Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier[118]
- SNOVA by Yasuhiko Ikematsu and Rika Akiyama[119]
See also
- Advanced Encryption Standard process
- CAESAR Competition – Competition to design authenticated encryption schemes
- Lattice-based cryptography
- NIST hash function competition
References
- ↑ "Post-Quantum Cryptography PQC". 3 January 2017. https://csrc.nist.gov/projects/post-quantum-cryptography.
- ↑ "Post-Quantum Cryptography Standardization – Post-Quantum Cryptography". 3 January 2017. https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization.
- ↑ Moody, Dustin (24 November 2020). "The Future Is Now: Spreading the Word About Post-Quantum Cryptography". NIST. https://www.nist.gov/blogs/taking-measure/future-now-spreading-word-about-post-quantum-cryptography.
- ↑ "Archived copy". https://post-quantum.ch/.
- ↑ Hong, Zhu (2001). Survey of Computational Assumptions Used inCryptography Broken or Not by Shor's Algorithm. http://crypto.cs.mcgill.ca/~crepeau/PDF/memoire-hong.pdf.
- ↑ "NIST Released NISTIR 8105, Report on Post-Quantum Cryptography". 21 December 2016. https://csrc.nist.gov/News/2016/NIST-Released-NISTIR-8105,-Report-on-Post-Quantum.
- ↑ "NIST Asks Public to Help Future-Proof Electronic Information". NIST. 20 December 2016. https://www.nist.gov/news-events/news/2016/12/nist-asks-public-help-future-proof-electronic-information. Retrieved 5 November 2019.
- ↑ Computer Security Division, Information Technology Laboratory (3 January 2017). "Round 1 Submissions – Post-Quantum Cryptography – CSRC". https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions.
- ↑ 9.0 9.1 9.2 "Archived copy". https://www.onboardsecurity.com/nist-post-quantum-crypto-submission.
- ↑ 10.0 10.1 "Google Groups". https://groups.google.com/a/list.nist.gov/forum/#!topic/pqc-forum/YsGkKEJTt5c.
- ↑ 11.0 11.1 "ROLLO". http://www.pqc-rollo.org/.
- ↑ RSA using 231 4096-bit primes for a total key size of 1 TiB. "Key almost fits on a hard drive" Bernstein, Daniel (2010-05-28). "McBits and Post-Quantum RSA". http://cr.yp.to/talks/2010.05.28/slides.pdf#page=29.
- ↑ Bernstein, Daniel; Heninger, Nadia (2017-04-19). "Post-quantum RSA". https://cr.yp.to/papers/pqrsa-20170419.pdf.
- ↑ "Dear all, the following Python script quickly recovers the message from a given "Guess Again" ciphertext without knowledge of the private key". https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/guess-again-official-comment.pdf.
- ↑ Panny, Lorenz (25 December 2017). "Fast key recovery attack against the "RVB" submission to #NISTPQC: t .... Computes private from public key.". Twitter. https://twitter.com/yx7__/status/945283780851400704.
- ↑ "Comments on RaCoSS". https://helaas.org/racoss/.
- ↑ "Comments on HK17". https://helaas.org/hk17/.
- ↑ "Dear all, We have broken SRTPI under CPA and TPSig under KMA.". https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/SRTPI-official-comment.pdf.
- ↑ Beullens, Ward; Blackburn, Simon R. (2018). "Practical attacks against the Walnut digital signature scheme". Cryptology ePrint Archive. https://eprint.iacr.org/2018/318.
- ↑ Kotov, Matvei; Menshov, Anton; Ushakov, Alexander (2018). "An attack on the walnut digital signature algorithm". Cryptology ePrint Archive. https://eprint.iacr.org/2018/393.
- ↑ Yu, Yang; Ducas, Léo (2018). "Learning strikes again: the case of the DRS signature scheme". Cryptology ePrint Archive. https://eprint.iacr.org/2018/294.
- ↑ Barelli, Elise; Couvreur, Alain (2018). "An efficient structural attack on NIST submission DAGS". arXiv:1805.05429 [cs.CR].
- ↑ Lequesne, Matthieu; Tillich, Jean-Pierre (2018). "Attack on the Edon-K Key Encapsulation Mechanism". arXiv:1802.06157 [cs.CR].
- ↑ Couvreur, Alain; Lequesne, Matthieu; Tillich, Jean-Pierre (2018). "Recovering short secret keys of RLCE in polynomial time". arXiv:1805.11489 [cs.CR].
- ↑ Bernstein, Daniel J.; Groot Bruinderink, Leon; Lange, Tanja; Lange, Lorenz (2017). "Hila5 Pindakaas: On the CCA security of lattice-based encryption with error correction". Cryptology ePrint Archive. https://eprint.iacr.org/2017/1214.
- ↑ "Official Comments". 13 September 2018. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/Giophantus-official-comment.pdf.
- ↑ Debris-Alazard, Thomas; Tillich, Jean-Pierre (2018). "Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme". arXiv:1804.02556 [cs.CR].
- ↑ "I am afraid the parameters in this proposal have at most 4 to 6-bits security under the Information Set Decoding (ISD) attack.". https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/McNie-official-comment.pdf.
- ↑ Lau, Terry Shue Chien; Tan, Chik How (31 January 2019). "Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation". Advances in Information and Computer Security. Lecture Notes in Computer Science. 11049. Springer International Publishing. pp. 19–34. doi:10.1007/978-3-319-97916-8_2. ISBN 978-3-319-97915-1.
- ↑ Computer Security Division, Information Technology Laboratory (3 January 2017). "Round 2 Submissions – Post-Quantum Cryptography – CSRC". https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions.
- ↑ 31.0 31.1 Schwabe, Peter. "CRYSTALS". https://pq-crystals.org/.
- ↑ "FrodoKEM". https://frodokem.org/.
- ↑ Schwabe, Peter. "NewHope". https://newhopecrypto.org/.
- ↑ "NTRU Prime: Intro". https://ntruprime.cr.yp.to/.
- ↑ "SABER". https://www.esat.kuleuven.be/cosic/pqcrypto/saber/index.html.
- ↑ "ThreeBears". https://sourceforge.net/projects/threebears/.
- ↑ "Falcon". https://falcon-sign.info/.
- ↑ "qTESLA – Efficient and post-quantum secure lattice-based signature scheme". https://qtesla.org/.
- ↑ "BIKE – Bit Flipping Key Encapsulation". https://bikesuite.org/.
- ↑ "HQC". https://pqc-hqc.org/.
- ↑ "LEDAkem Key Encapsulation Module". https://www.ledacrypt.org/LEDAkem/.
- ↑ "LEDApkc Public Key Cryptosystem". https://www.ledacrypt.org/LEDApkc/.
- ↑ "NTS-Kem". https://nts-kem.io/.
- ↑ "RQC". http://pqc-rqc.org/.
- ↑ "Sphincs". Sphincs.org. https://sphincs.org/. Retrieved 2023-06-19.
- ↑ "GeMSS". https://www-polsys.lip6.fr/Links/NIST/GeMSS.html.
- ↑ "LUOV -- An MQ signature scheme". https://www.esat.kuleuven.be/cosic/pqcrypto/luov/.
- ↑ "MQDSS post-quantum signature". http://mqdss.org/.
- ↑ "SIKE – Supersingular Isogeny Key Encapsulation". http://sike.org/.
- ↑ "Picnic. A Family of Post-Quantum Secure Digital Signature Algorithms". https://microsoft.github.io/Picnic/.
- ↑ Moody, Dustin; Alagic, Gorjan; Apon, Daniel C.; Cooper, David A.; Dang, Quynh H.; Kelsey, John M.; Liu, Yi-Kai; Miller, Carl A. et al. (2020). Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. doi:10.6028/NIST.IR.8309. https://csrc.nist.gov/publications/detail/nistir/8309/final. Retrieved 2020-07-23.
- ↑ (in en) Third PQC Standardization Conference - Session I Welcome/Candidate Updates, 10 June 2021, https://www.nist.gov/video/third-pqc-standardization-conference-session-i-welcomecandidate-updates, retrieved 2021-07-06
- ↑ Computer Security Division, Information Technology Laboratory (2021-02-10). "Third PQC Standardization Conference | CSRC" (in EN-US). https://csrc.nist.gov/Events/2021/third-pqc-standardization-conference.
- ↑ "Submission Requirements and Evaluation Criteria". https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/call-for-proposals-final-dec-2016.pdf.
- ↑ Beullens, Ward (2022). Breaking Rainbow Takes a Weekend on a Laptop. https://eprint.iacr.org/2022/214.pdf.
- ↑ Grubbs, Paul; Maram, Varun; Paterson, Kenneth G. (2021). "Anonymous, Robust Post-Quantum Public Key Encryption". Cryptology ePrint Archive. https://eprint.iacr.org/2021/708.
- ↑ Karabulut, Emre; Aysu, Aydin (2021). "Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks". Cryptology ePrint Archive. https://eprint.iacr.org/2021/772.
- ↑ "NIST Announces First Four Quantum-Resistant Cryptographic Algorithms" (in EN-US). NIST. 2022-07-05. https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms. Retrieved 2022-07-09.
- ↑ "Selected Algorithms 2022" (in EN-US). 2022-07-05. https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022.
- ↑ "Round 4 Submissions" (in EN-US). 2022-07-05. https://csrc.nist.gov/Projects/post-quantum-cryptography/round-4-submissions.
- ↑ "Error: no
|title=
specified when using {{Cite web}}". https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/submissions/sike-team-note-insecure.pdf. - ↑ Goodin, Dan (2 August 2022). "Post-quantum encryption contender is taken out by single-core PC and 1 hour". https://arstechnica.com/information-technology/2022/08/sike-once-a-post-quantum-encryption-contender-is-koed-in-nist-smackdown/.
- ↑ Moody, Dustin (17 July 2023). "Onramp submissions are posted!". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/4zNPlO_NHas.
- ↑ "Digital Signature Schemes". 29 August 2022. https://csrc.nist.gov/Projects/pqc-dig-sig/round-1-additional-signatures.
- ↑ "SMAUG & HAETAE - HAETAE". https://kpqc.cryptolab.co.kr/haetae.
- ↑ "Hufu". http://123.56.244.4/.
- ↑ "RACCOON – Not just a signature, a whole family of it !". https://raccoonfamily.org/.
- ↑ "masksign/raccoon: Raccoon Signature Scheme -- Reference Code". https://github.com/masksign/raccoon/.
- ↑ "Squirrels - Introduction". https://www.squirrels-pqc.org/.
- ↑ "CROSS crypto". https://cross-crypto.com/.
- ↑ "FuLeeca: A Lee-based Signature Scheme - Lehrstuhl für Nachrichtentechnik". https://www.ce.cit.tum.de/lnt/forschung/professur-fuer-coding-and-cryptography/fuleeca/.
- ↑ "LESS project". https://www.less-project.com/.
- ↑ "MEDS". https://www.meds-pqc.org/.
- ↑ "WAVE". https://wave-sign.org/.
- ↑ "MIRA". https://pqc-mira.org/.
- ↑ "Crypto-TII/mirith_nist_submission: To contain the submissions code of the MiRitH Digital Signature Scheme for the NIST Post-Quantum Digital Signature standardization process". https://github.com/Crypto-TII/mirith_nist_submission.
- ↑ "MQOM". https://www.mqom.org/.
- ↑ "PERK". https://pqc-perk.org/.
- ↑ "RYDE". https://pqc-ryde.org/.
- ↑ "SD-in-the-Head". https://sdith.org/.
- ↑ 81.0 81.1 Smith-Tone, Daniel (17 July 2023). "OFFICIAL COMMENT: 3WISE". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/fsfGqHCgGvY.
- ↑ "Home". https://www.biscuit-pqc.org/.
- ↑ "OFFICIAL COMMENT: DME Key Recovery Attack". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/aoXpl4TlNh4.
- ↑ "MAYO". https://pqmayo.org/.
- ↑ "PROV". https://prov-sign.github.io/.
- ↑ "QR-UOV". https://info.isl.ntt.co.jp/crypt/qruov/.
- ↑ "SNOVA". https://snova.pqclab.org/.
- ↑ "TUOV". https://www.tuovsig.org/.
- ↑ "UOV". https://www.uovsig.org/.
- ↑ "VOX". https://vox-sign.com/.
- ↑ "SQIsign". https://sqisign.org/.
- ↑ "AIMer Signature". https://aimer-signature.org/.
- ↑ "Come and join the FAEST | FAEST Signature Algorithm". https://faest.info/.
- ↑ "ALTEQ". https://pqcalteq.github.io/.
- ↑ Tibouchi, Mehdi (17 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EagleSign". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/zas5PLiBe6A.
- ↑ Bernstein, D.J. (17 July 2023). "OFFICIAL COMMENT: KAZ-SIGN". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/2ljDcgtawFw.
- ↑ Fluhrer, Scott (17 July 2023). "KAZ-SIGN". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/aCbi4BMDeUs.
- ↑ Panny, Lorenz (17 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: Xifrat1-Sign.I". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/9FXtBZKWueA.
- ↑ Tibouchi, Mehdi (18 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EagleSign". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/zas5PLiBe6A/m/EVmNzzglBQAJ.
- ↑ Beullens, Ward (18 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: HPPC". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KRh8w03PW4E.
- ↑ Perlner, Ray (21 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: HPPC". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KRh8w03PW4E/m/IYGDdEJEBgAJ.
- ↑ Saarinen, Markku-Juhani O. (18 July 2023). "OFFICIAL COMMENT: ALTEQ". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/-LCPCJCyLlc.
- ↑ Bouillaguet, Charles (19 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: Biscuit". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/sw8NueiNek0.
- ↑ Niederhagen, Ruben (19 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: MEDS". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/CtCe8WXUoXI/m/jgWQ0ia7BQAJ.
- ↑ van Woerden, Wessel (20 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: FuLeeca". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KvIege2EbuM.
- ↑ Persichetti, Edoardo (21 July 2023). "OFFICIAL COMMENT: LESS". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Z36SPZJI8Ok.
- ↑ Saarinen, Markku-Juhani O.. "Round 1 (Additional Signatures) OFFICIAL COMMENT: DME-Sign". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/E0mMMGI5eWE.
- ↑ "OFFICIAL COMMENT: DME Key Recovery Attack". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/aoXpl4TlNh4.
- ↑ van Woerden, Wessel (Jul 25, 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EHTv3". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/mFl_5Rq6-RU.
- ↑ Suhl, Adam (Jul 29, 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EHT". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/bkJKBFq3TDY.
- ↑ VASSEUR, Valentin (Jul 29, 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: Enhanced pqsigRM". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/yQ1CKOLbGng.
- ↑ "Round 1 (Additional Signatures) OFFICIAL COMMENT: Enhanced pqsigRM". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/4_nUCDvDqqs.
- ↑ Saarinen, Markku-Juhani O. (Jul 27, 2023). "Buffer overflows in HAETAE / On crypto vs implementation errors.". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ImcSqGLFdoo.
- ↑ Saarinen, Markku-Juhani O. (Jul 29, 2023). "HuFu: Big-flipping forgeries and buffer overflows". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Hq-wRFDbIaU.
- ↑ Carrier, Kevin (Aug 3, 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: SDitH". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/d_BcUfFGl5o.
- ↑ Carrier, Kevin; Hatey, Valérian; Tillich, Jean-Pierre (5 Dec 2023). "Projective Space Stern Decoding and Application to SDitH". arXiv:2312.02607 [cs.IT].
- ↑ Furue, Hiroki (Aug 28, 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: VOX". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/icHfTrzkfw4.
- ↑ Liu, Fukang; Mahzoun, Mohammad; Øygarden, Morten; Meier, Willi (10 November 2023). "Algebraic Attacks on RAIN and AIM Using Equivalent Representations". IACR ePrint (2023/1133). https://eprint.iacr.org/2023/1133.
- ↑ Ikematsu, Yasuhiko; Akiyama, Rika (2024), Revisiting the security analysis of SNOVA, https://eprint.iacr.org/2024/096, retrieved 2024-01-28
External links
Original source: https://en.wikipedia.org/wiki/NIST Post-Quantum Cryptography Standardization.
Read more |