FrodoKEM
From MaRDI portal
Software:46969
swMATH35260MaRDI QIDQ46969FDOQ46969
Author name not available (Why is that?)
Source code repository: https://github.com/Microsoft/PQCrypto-LWEKE
Cited In (24)
- Key mismatch attack on ThreeBears, Frodo and Round5
- Towards post-quantum security for signal's X3DH handshake
- Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency
- A framework for cryptographic problems from linear algebra
- On the asymptotic complexity of solving LWE
- Assessing the feasibility of single trace power analysis of Frodo
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Just Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP)
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange
- A novel classical and quantum cryptographic scheme for data encryption
- Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem
- Algebraic generalization of Diffie-Hellman key exchange
- Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography
- The matrix reloaded: multiplication strategies in FrodoKEM
- Anonymous, robust post-quantum public key encryption
- A note on the concrete hardness of the shortest independent vector in lattices
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting
- Verifying solutions to LWE with implications for concrete security
- Estimation of the hardness of the learning with errors problem with a restricted number of samples
- Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants
- Strongly leakage resilient authenticated key exchange, revisited
- Lower bounds on lattice sieving and information set decoding
- DAGS: key encapsulation using dyadic GS codes
- Title not available (Why is that?)
This page was built for software: FrodoKEM