Difference between revisions of "FALCON"

From PQC WIKI
en>Admin
 
m (1 revision imported)
 
(No difference)

Latest revision as of 23:34, 12 May 2021


Information

Authors

  • Pierre-Alain Fouque
  • Jeffrey Hoffstein
  • Paul Kirchner
  • Vadim Lyubashevsky
  • Thomas Pornin
  • Thomas Prest
  • Thomas Ricosset
  • Gregor Seiler
  • William Whyte
  • Zhenfei Zhang.


Official Links

Related Articles

ModFalcon: compact signatures based on module NTRU lattices
Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehlé and Alexandre Wallet and Keita Xagawa.
Cryptology ePrint Archive: Report 2019/1456, 18 Dec 2019.

New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin.
Cryptology ePrint Archive: Report 2019/893, 18 Sep 2019.

BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill.
Cryptology ePrint Archive: Report 2019/478, 18 May 2019.

Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede.
DAC 19, June 2019.

More Efficient Algorithms for the NTRU Key Generation Using the Field Norm
Thomas Pornin and Thomas Prest.
PKC 2019, 2019.

Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang.
Cryptology ePrint Archive: Report 2018/857, 13 Mar 2019.

Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos.
ACM CCS 2015, 2014.


Summary Table

FALCON - ROUND 1,2

Description lattice

NTRU

Assumption NTRU
Functionality Signature
Public Key

(bytes)

  • level 1: 897
  • level 2: 1441
  • level 3: 1793
Secret Key

(bytes)

  • level 1: -
  • level 2: -
  • level 3: -
CIPH/SIG

(bytes)

  • level 1: 618
  • level 2: 994
  • level 3: 1234
Security

Type

EUF-CMA

Related Articles

Trapdoors for Hard Lattices and New Cryptographic Constructions
Craig Gentry and Chris Peikert and Vinod Vaikuntanathan.
STOC 2008, 16 Jun 2010.