49 Followers
42 Following
47 Posts
http://post-quantum-crypto.com and proud to organise the http://isogeny.club with Jonathan Eriksen
#eprint AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing by Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Krijn Reijnders (https://ia.cr/2023/1559)
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing

We optimise the verification of the SQIsign signature scheme. By using field extensions in the signing procedure, we are able to significantly increase the amount of available rational $2$-power torsion in verification, which achieves a significant speed-up. This, moreover, allows several other speed-ups on the level of curve arithmetic. We show that the synergy between these high-level and low-level improvements gives significant improvements, making verification $2.07$ times faster, or up to $3.41$ times when using size-speed trade-offs, compared to the state of the art, without majorly degrading the performance of signing.

IACR Cryptology ePrint Archive
#eprint Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders by Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski (https://ia.cr/2023/1268)
Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders

#eprint Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing by Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi (https://ia.cr/2023/1261)
Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing

We generalize the Bernstein-Yang (BY) algorithm for constant-time modular inversion to compute the Kronecker symbol, of which the Jacobi and Legendre symbols are special cases. We start by developing a basic and easy-to-implement divstep version of the algorithm defined in terms of full-precision division steps. We then describe an optimized version due to Hamburg over word-sized inputs, similar to the jumpdivstep version of the BY algorithm, and formally verify its correctness. Along the way, we introduce a number of optimizations for implementing both versions in constant time and at high-speed. The resulting algorithms are particularly suitable for the special case of computing the Legendre symbol with dense prime $p$, where no efficient addition chain is known for the conventional approach by exponentiation to $\frac{p-1}{2}$. This is often the case for the base field of popular pairing-friendly elliptic curves. Our high-speed implementation for a range of parameters shows that the new algorithm is up to 40 times faster than the conventional exponentiation approach, and up to 25.7\% faster than the previous state of the art. We illustrate the performance of the algorithm with an application for hashing to elliptic curves, where the observed savings amount to 14.7\% -- 48.1\% when used for testing quadratic residuosity within the SwiftEC hashing algorithm. We also apply our techniques to the CTIDH isogeny-based key exchange, with savings of 3.5--13.5\%.

IACR Cryptology ePrint Archive

Played around a bit yesterday to build http://isogeny.post-quantum-crypto.com

Any tips or feedback welcome!

post quantum crypto

A Chrome Security news dump!

Postquantum key encapsulation is coming to a Chrome Stable near you soon: https://blog.chromium.org/2023/08/protecting-chrome-traffic-with-hybrid.html

We also wrote about how public key pinning fits into the Chrome Security model, now more coherently because we brought support to Chrome on Android: https://security.googleblog.com/2023/08/making-chrome-more-secure-by-bringing.html

And lots more in the Q2 security team summary: https://www.chromium.org/Home/chromium-security/quarterly-updates/#q2-2023

Protecting Chrome Traffic with Hybrid Kyber KEM

Teams across Google are working hard to prepare the web for the migration to quantum-resistant cryptography. Continuing with our strategy f...

Chromium Blog

I built a thing: compare the 40 submissions to the second NIST post-quantum signatures standardization project using this nifty tool:

https://pqshield.github.io/nist-sigs-zoo/

Post-Quantum signatures zoo

Blog post by Luca De Feo on SIAM conference on Applied Algebraic Geometry
https://ellipticnews.wordpress.com/2023/07/20/siam-conference-on-applied-algebraic-geometry-ag23/
SIAM Conference on Applied Algebraic Geometry (AG23)

The SIAM conference on Applied Algebraic Geometry took place in Eindhoven last week. The “mini symposia” included: Applications of Algebraic Geometry to Post-Quantum Cryptology Elliptic…

ellipticnews

Started with https://nist.post-quantum-crypto.com/ to collect all submissions to the NIST Signature competition. Let me know if you know any more!

Also, you can then easily remember the link to any scheme, as they are hyperlinked as [name].post-quantum-crypto.com.

For example, MEDS is available at https://meds.post-quantum-crypto.com

NIST Signatures

Have a FAEST on post-quantum digital signatures based on the security of the AES function...

https://faest.info/

Great work from a team of Aalto, Aarhus, AIT, Bocconi, DTU, KU Leuven, and TU Graz authors.

Come and join the FAEST

The FAEST digital signature algorithm

FAEST Signature Algorithm

Wanna join a fantastic university in The Netherlands? What about applying for a position as assistant, associate, or full professor at the Digital Security department of Radboud University!

Link: https://www.ru.nl/en/working-at/job-opportunities/assistantassociatefull-professor-at-the-institute-for-computing-and-information-sciences-career-track?utm_source=socials&utm_medium=social&utm_campaign=vacaturecampagne&utm_content=network

Assistant/Associate/Full Professor at the Institute for Computing and Information Sciences (career track) | Radboud University

We are looking for five outstanding researchers and lecturers in the field of computing science on the Assistant, Associate or Full Professor level.