At this conference, we will discuss various aspects of the candidate algorithms and obtain valuable feedback for informing decisions on standardization. NIST will invite the submission teams for both the selected algorithms, as well as the algorithms advancing to the fourth round, to give an update on their algorithms.
Call for Papers (closed 9/15/2022)
On-Demand Videos
Conference Inquiries: pqc2022@nist.gov
Benchmarking and Analysing NIST PQC Lattice-Based Signature Scheme Standards on the ARM Cortex M7
James Howe, Bas Wasterbaan
A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext
Guillaume Goy, Antoine Loiseau, Philippe Gaborit
Constrained Radio Networks, Small Ciphertexts, Signatures, and Non-Interactive Key Exchange
John Preuß Mattsson, Göran Selander, Ben Smeets, Erik Thormarker
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
Emre Karabulut, Aydin Aysu
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
Quantum Augmented Dual Attack
Martin R. Albrecht, Yixin Shen
A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm
Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang
Practical Improvements on BKZ Algorithm
Ziyu Zhao, Jintai Ding
Mckeycutter: A High-throughput Key Generator of Classic McEliece on Hardware
Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu
Post-Quantum Protocols for Banking Applications
Luk Bettale, Marco De Oliveira, Emmanuelle Dottax
Algebraic Relation of Three MinRank Algebraic Modelings
Hao Guo, Jintai Ding
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost
Andreas Hülsing, Mikhail Kudinov, Eyal Ronen, Eylon Yogev
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model
Haruhisa Kosuge, Keita Xagawa
Leveling Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations
Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Markus Schönauer, François-Xavier Standaert, Christine van Vredendaal
Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption
Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice
Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., Swapneel Sheth
The Challenge of Side-Channel Countermeasures on Post-Quantum Crypto
Rina Zeitoun
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable
Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest
Fast and Efficient Hardware Implementation of HQC
Sanjay Deshpande, Mamuri Nawan, Kashif Nawaz, Jakub Szefer, Chuanqi Xu
Optimization for SPHINCS+ using Intel® Secure Hash Algorithm Extensions
Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry
A Flexible Shared Hardware Accelerator for NIST-Recommended Algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA Protection
Luke Beckwith, Abubakr Abdulgadir, Reza Azarderakhsh
Complete and Improved FPGA Implementation of Classic McEliece
Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions
Duc Tri Nguyen, Kris Gaj
FPGA Energy Consumption of Post-Quantum Cryptography (paper accepted, no presentation)
Luke Beckwith, Jens-Peter Kaps, Kris Gaj
High-Performance Hardware Implementation of Lattice-Based Digital Signatures
Luke Beckwith, Duc Tri Nguyen, Kris Gaj
Selected Presentations | |
---|---|
November 29, 2022 | Type |
10:10 AM
NIST PQC: Looking into the Future Dustin Moody - NIST |
Presentation |
10:30 AM
CRYSTALS-Kyber Update Peter Schwabe - Radboud University |
Presentation |
10:45 AM
CRYSTALS-Dilithium Update Vadim Lyubashevsky - IBM Research Europe |
Presentation |
11:00 AM
FALCON Update Thomas Prest - PQShield |
Presentation |
11:15 AM
SPHINCS+ Update Andreas Hülsing - Eindhoven University of Technology |
Presentation |
11:30 AM
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost Eyal Ronen - Tel Aviv University |
Presentation |
11:50 AM
Twelve-round Keccak for secure hashing Gilles Van Assche - STMicroelectronics |
Presentation |
1:00 PM
A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext Goy Guillaume - Université Grenoble Alpes, CEA |
Presentation |
1:20 PM
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks Aydin Aysu - North Carolina State University |
Presentation |
1:40 PM
Leveling Dilithium against Leakage, Revisited Sensitivity Analysis and Improved Implementations Melissa Azouaoui - NXP Semiconductors |
Presentation |
2:00 PM
The Challenge of Side-Channel Countermeasures on Post-Quantum Crypto Rina Zeitoun - IDEMIA |
Presentation |
2:20 PM
Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption François-Xavier Standaert - UCLouvain Thomas Peters - UCLouvain |
Presentation |
2:40 PM
Optimization for SPHINCS+ using Intel® Secure Hash Algorithm Extensions Qian Wang - Intel |
Presentation |
November 30, 2022 | Type |
10:00 AM
Transitioning National Security Systems to a Post Quantum Future Morgan Stern - NSA |
Presentation |
10:40 AM
Practical Improvements on BKZ Algorithm Ziyu Zhao - Tsinghua University |
Presentation |
11:00 AM
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model Haruhisa Kosuge - Japan Ministry of Defense |
Presentation |
11:20 AM
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem Christopher Battarbee - University of York, UK |
Presentation |
11:40 AM
Quantum Augmented Dual Attack Yixin Shen - Royal Holloway, University of London |
Presentation |
1:00 PM
BIKE Update Rafael Misoczki - Google |
Presentation |
1:15 PM
Classic McEliece Update Chou Tung - Academia Sinica |
Presentation |
1:30 PM
HQC Update Phillippe Gaborit - University of Limoges |
Presentation |
1:45 PM
SIKE Update David Jao - University of Waterloo |
Presentation |
2:00 PM
Benchmarking and Analysing NIST PQC Lattice-Based Signature Scheme Standards on the ARM Cortex M7 James Howe - SandboxAQ |
Presentation |
2:20 PM
A Flexible Shared Hardware Accelerator for NIST-Recommended Algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA Protection Abubakr Abdulgadir - PQSecure Technologies |
Presentation |
2:40 PM
High-Performance Hardware Implementation of Lattice-Based Digital Signatures Luke Beckwith - George Mason University |
Presentation |
December 1, 2022 | Type |
10:00 AM
The National Cybersecurity Center of Excellences (NCCoE) Migration to Post-Quantum Cryptography Project William Newhouse - NIST/NCCoE |
Presentation |
10:50 AM
Algebraic Relation of Three MinRank Algebraic Modelings Hao Guo - Tsinghua University |
Presentation |
11:10 AM
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice Burt Kaliski - Verisign |
Presentation |
11:30 AM
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable Thomas Prest - PQShield |
Presentation |
1:00 PM
A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm Tendayi Kamucheka - University of Arkansas |
Presentation |
1:20 PM
Mckeycutter: A High-throughput Key Generator of Classic McEliece on Hardware Yinhong Zhu - Tsinghua University |
Presentation |
1:40 PM
A Fast Hardware Implementation of HQC Sanjay Deshpande - Yale University |
Presentation |
2:00 PM
Complete and Improved FPGA Implementation of Classic McEliece Sanjay Deshpande - Yale University |
Presentation |
2:20 PM
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions Duc Tri Nguyen - George Mason University |
Presentation |
2:40 PM
Constrained Radio Networks, Small Ciphertexts, Signatures, and Non-Interactive Key Exchange John Mattsson - Ericsson |
Presentation |
2:50 PM
Post-Quantum Protocols for Banking Applications Emmanuelle Dottax - IDEMIA |
Presentation |
Starts: November 29, 2022 - 10:00 AM EST
Ends: December 01, 2022 - 03:30 PM EST
Format: Virtual Type: Conference
Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other
Virtual
Security and Privacy: post-quantum cryptography