copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
Cryptology ePrint Archive For more than 20 years, the Cryptology ePrint Archive has been publishing pre-print papers relevant to the field of cryptology You can read more about our goals and history, see our acceptance and publishing conditions, check out some statistics, or contact us
About the Cryptology ePrint Archive - IACR The Cryptology ePrint Archive provides rapid access to recent research in cryptology Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria
Submit a paper - IACR The Cryptology ePrint Archive uses MathJax which only renders mathematics For example, you should not use \emph { } for italics, and you should not include any \cite { } commands
Operations of the Cryptology ePrint Archive - IACR In this respect, the papers in the Cryptology ePrint Archive have the status of technical reports Papers submitted may be author versions of published papers if the copyright holder allows such posting
SQISignHD: New Dimensions in Cryptography - IACR Cryptology ePrint Archive We introduce SQIsignHD, a new post-quantum digital signature scheme inspired by SQIsign SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on SIDH, which allows to efficiently represent isogenies of arbitrary degrees as components of a higher dimensional isogeny SQIsignHD overcomes the main drawbacks of SQIsign First, it scales well to high security levels, since
Browse by year and category - IACR Note: In order to protect the privacy of readers, eprint iacr org does not use cookies or embedded third party content
Circuit Bootstrapping: Faster and Smaller - IACR Cryptology ePrint Archive We present a novel circuit bootstrapping algorithm that outperforms the state-of-the-art TFHE method with 9 9× speedup and 15 6× key size reduction These improvements can be attributed to two technical contributions Firstly, we redesigned the circuit bootstrapping workflow to operate exclusively under the ring ciphertext type, which eliminates the need of conversion between LWE and RLWE
SQISign: compact post-quantum signatures from quaternions and isogenies We introduce a new signature scheme, SQISign, (for Short Quaternion and Isogeny Signature) from isogeny graphs of supersingular elliptic curves The signature scheme is derived from a new one-round, high soundness, interactive identification protocol Targeting the post-quantum NIST-1 level of security, our implementation results in signatures of $204$ bytes, secret keys of $16$ bytes and