FrodoKEM
From MaRDI portal
swMATH35260MaRDI QIDQ46969FDOQ46969
Author name not available (Why is that?)
Official website: https://frodokem.org
Source code repository: https://github.com/Microsoft/PQCrypto-LWEKE
Cited In (54)
- RLizard
- Key mismatch attack on ThreeBears, Frodo and Round5
- Towards post-quantum security for signal's X3DH handshake
- Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency
- A framework for cryptographic problems from linear algebra
- On the asymptotic complexity of solving LWE
- Assessing the feasibility of single trace power analysis of Frodo
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange
- A novel classical and quantum cryptographic scheme for data encryption
- Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem
- Algebraic generalization of Diffie-Hellman key exchange
- Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
- Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography
- The matrix reloaded: multiplication strategies in FrodoKEM
- Anonymous, robust post-quantum public key encryption
- A note on the concrete hardness of the shortest independent vector in lattices
- McEliece
- BLISS
- Charm
- BKZ
- ETRU
- MaTRU
- NTRU
- NTRUSign
- McBits
- Just take the average! An embarrassingly simple \(2^n\)-time algorithm for SVP (and CVP)
- FORSAKES
- CAKE
- liboqs
- Saber
- FALCONN
- WalnutDSA
- Nginx
- Falcon
- LEDAkem
- Elligator
- PQM4
- tiny_sha3
- Thumbulator
- Durandal
- BIKE
- GeMSS
- FACCT
- GALATICS
- LEDAcrypt
- Verifying solutions to LWE with implications for concrete security
- Estimation of the hardness of the learning with errors problem with a restricted number of samples
- Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants
- Strongly leakage resilient authenticated key exchange, revisited
- Lower bounds on lattice sieving and information set decoding
- PQClean
- DAGS: key encapsulation using dyadic GS codes
- Title not available (Why is that?)
This page was built for software: FrodoKEM