• Analysis of key reuse attacks on the Post-Quantum-scheme NewHope 

      Swarowsky, Markus (Master thesis, 2020)
      Up to now, quantum computers have only been considered a theoreticalthreat to today’s public-key-cryptography. Also, nobody can say exactlyhow long it will take until the first larger quantum computers exist. Butrecently ...
    • Evaluating Post-Quantum Group Key Exchange 

      Kristiansen, Simen Been (Master thesis, 2020)
      Offentlig nøkkelkryptografi er grunnlaget som sikkerheten til mange populære tjenester er bygget på. Nyere innovasjoner innen kvantedatamaskiner kan utgjøre en risiko for dette nåværende paradigmet. Kvantesikker kryptografi ...
    • Practical Isogeny-Based Key-Exchange with Optimal Tightness 

      de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia (Journal article; Peer reviewed, 2021)
      We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ...
    • Symmetric Key Exchange with Full Forward Security and Robust Synchronization 

      Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise (Peer reviewed; Journal article, 2021)
      We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous ...