Difference between revisions of "FALCON"
en>Admin |
m (1 revision imported) |
(No difference)
|
Latest revision as of 23:34, 12 May 2021
Information
Authors
- Pierre-Alain Fouque
- Jeffrey Hoffstein
- Paul Kirchner
- Vadim Lyubashevsky
- Thomas Pornin
- Thomas Prest
- Thomas Ricosset
- Gregor Seiler
- William Whyte
- Zhenfei Zhang.
Official Links
Related Articles
ModFalcon: compact signatures based on module NTRU lattices
Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehlé and Alexandre Wallet and Keita Xagawa.
Cryptology ePrint Archive: Report 2019/1456, 18 Dec 2019.
New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin.
Cryptology ePrint Archive: Report 2019/893, 18 Sep 2019.
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill.
Cryptology ePrint Archive: Report 2019/478, 18 May 2019.
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede.
DAC 19, June 2019.
More Efficient Algorithms for the NTRU Key Generation Using the Field Norm
Thomas Pornin and Thomas Prest.
PKC 2019, 2019.
Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang.
Cryptology ePrint Archive: Report 2018/857, 13 Mar 2019.
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos.
ACM CCS 2015, 2014.
Summary Table
FALCON - ROUND 1,2 | |||
---|---|---|---|
Description | lattice
NTRU | ||
Assumption | NTRU | ||
Functionality | Signature | ||
Public Key
(bytes) |
| ||
Secret Key
(bytes) |
| ||
CIPH/SIG
(bytes) |
| ||
Security
Type |
EUF-CMA |
Related Articles
Trapdoors for Hard Lattices and New Cryptographic Constructions
Craig Gentry and Chris Peikert and Vinod Vaikuntanathan.
STOC 2008, 16 Jun 2010.