Difference between revisions of "Round5"
en>Admin |
m (1 revision imported) |
(No difference)
|
Latest revision as of 23:34, 12 May 2021
Round5 is a merger of HILA5 and Round2
Information
Authors
- Hayo Baan (Philips, NL)
- Sauvik Bhattacharya (Philips, NL)
- Jung Hee Cheon (SNU, Kr)
- Scott Fluhrer (Cisco, US)
- Oscar Garcia-Morchon (Philips, NL)
- Thijs Laarhoven (TU/e, NL)
- Rachel Player (RHUL, UK)
- Ronald Rietman (Philips, NL)
- Markku-Juhani Olavi Saarinen (PQShield, UK)
- Yongha Son (SNU, Kr)
- Ludo Tolhuizen (Philips, NL)
- Jose Luis Torre Arce (Philips, NL)
- Zhenfei Zhang (Algorand, US; before with OnboardSecurity)
- Oscar Garcia-Morchon
- Zhenfei Zhang
- Sauvik Bhattacharya
- Ronald Rietman
- Ludo Tolhuizen
- Jose-Luis Torre-Arce
- Hayo Baan
Official Links
- Official Website: ROUND5
- Submission Details:
- Official Comments:
Related Articles
A Note on Parameter Choices of Round5
Yongha Son.
Cryptology ePrint Archive: Report 2019/949, 20 Aug 2019.
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Markku-Juhani O. Saarinen.
PQC Standardization Conference 2019, 2019.
Round5: Compact and Fast Post-Quantum Public-Key Encryption
HHayo Baan and Sauvik Bhattacharya and Scott Fluhrer and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang.
PQCrypto ‘19.
Round5: KEM and PKE based on GLWR
Sauvik Bhattacharya and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang.
Cryptology ePrint Archive: Report 2018/725.
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Markku-Juhani O. Saarinen and Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Zhenfei Zhang., CARDIS ‘18.
Summary Table
Round 1 | |||
---|---|---|---|
HILA 5 | Round2 | ||
Type | Lattice | ||
Description | RLWE | LWR | |
Assumption | RLWE | GLWR | |
Functionality | PKE/KEM | ||
Public Key
(bytes) |
|
| |
Secret Key
(bytes) |
|
| |
CIPH/SIG
(bytes) |
|
| |
Security
Type |
IND-CPA | IND-CCA |
Round 2
| ||||||
---|---|---|---|---|---|---|
R5ND_KEM_5d | R5ND_PKE_5d | R5ND_KEM_0d | R5ND_PKE_0d | R5N1_KEM_0d | R5N1_PKE_0d | |
Type | Lattice | |||||
Description | LWR | |||||
Assumption | RLWE | RLWR | RLWR | RLWR | LWR | LWR |
Functionality | KEM | PKE | KEM | PKE | KEM | PKE |
Public Key
(bytes) |
|
|
|
|
|
|
Secret Key
(bytes) |
|
|
|
|
|
|
CIPH/SIG
(bytes) |
|
|
|
|
|
|
Security
Type |
IND-CPA | IND-CCA | IND-CPA | IND-CCA | IND-CPA | IND-CCA |