Post quantum cryptography

Hardware Realization and Implementation Security Evaluation of HQC, A NIST PQC Standard

Hardware Realization and Implementation Security Evaluation of HQC, A NIST PQC Standard

This talk by Sanjay Deshpande from Northwestern University explores the critical transition to Post-Quantum Cryptography (PQC) in response to the threat quantum computers pose to current public-key algorithms. It provides a deep dive into the Hamming Quasi-Cyclic (HQC) algorithm, a code-based candidate for NIST standardization. The session focuses on the challenges and innovations in creating efficient and secure hardware implementations of HQC, covering performance optimization for polynomial multiplication and countermeasures against side-channel attacks.

Efficient Homomorphic Integer Computer from CKKS

Efficient Homomorphic Integer Computer from CKKS

A deep dive into the hardware design and implementation of HQC, a post-quantum cryptography scheme. The talk covers performance and security bottlenecks, detailing novel solutions for efficient polynomial multiplication by leveraging sparsity and constant-time methods for generating fixed-weight vectors to thwart side-channel attacks.

Lattice-Based Accumulator and Application to Anonymous Credential Revocation

Lattice-Based Accumulator and Application to Anonymous Credential Revocation

Victor Youdom Kemmoe from Brown University presents a novel, communication-efficient cryptographic accumulator based on the Module-SIS assumption. This construction is designed for applications like anonymous credential revocation, where elements can be added without needing to update existing membership witnesses, a significant improvement over previous post-quantum schemes.

A Formal Analysis of Apple’s iMessage PQ3 Protocol

A Formal Analysis of Apple’s iMessage PQ3 Protocol

A detailed overview of the formal verification of Apple's iMessage PQ3 protocol using the Tamarin prover. The talk covers PQ3's hybrid cryptographic design, its post-quantum security goals like forward secrecy and post-compromise security, the powerful adversary model it resists, and the successful formal analysis of its unbounded double ratchet structure.