
Leonardo Errati
Cryptography PhD student @ PoliTo, Italy.
StarXive
Welcome to Leonardo's omnium archive.
View all or filter by tag.
Explore the main tags:
Articles
Damgard07
A “proof-reading” of some issues in cryptography
(I. Damgard)
Issues with security proofs and why we still need them
EPRINT: SanBalChia22
Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems
(P. Santini, M. Baldi, F. Chiaraluce)
PKP, SEP and their equivalence
ARXIV: SanBalChia22
A Novel Attack on the Permuted Kernel Problem
(P. Santini, M. Baldi, F. Chiaraluce)
Improved the classical PKP attack
CRYPTO: Shamir89
An Efficient Identification Scheme Based on Permuted Kernels
(A. Shamir)
Defines PKP and builds an identification scheme
ARXIV: Sanna24
On the number of solutions to a random instance of the permuted kernel problem
(C. Sanna)
The standard heuristic differs a lot from the expected value
EPRINT: AABN02
From Identification to Signatures via the Fiat-Shamir Transform
(M. Abdalla, J. Anm M. Bellare, C. Namprempre)
Proof of security of the Fiat-Shamir paradigm
EUROCRYPT: Shoup97
Lower Bounds for Discrete Logarithms and Related Problems
(V. Shoup)
Introduction of the generic group model
EPRINT: BelDaiLi19
The Local Forking Lemma and its Application to Deterministic Encryption
(M. Bellare, W. Dai, L. Li)
A forking lemma only reprogramming one point
EPRINT: CriKomMal23
Fully Adaptive Schnorr Threshold Signatures
(E. Crites, C. Komlo, M. Maller)
Threshold signatures with adaptive security
EPRINT: ChoPerSan23
On Linear Equivalence, Canonical Forms, and Digital Signatures
(T. Chou, E. Persichetti, P. Santini)
Compress the zero-knowledge proof via CF-LEP.
EPRINT: DKLPW20
SQISign: compact post-quantum signatures from quaternions and isogenies
(L. De Feo, D. Kohel, A. Leroux, C. Petit, B. Wesolowski)
Constructs SQISign from an identification protocol.
Books
Lecture notes
Kamara17
A Brief Introduction to Cryptography
(S. Kamara)
Game-based & simulation-based techniques, hands-on introduction
GolBel08
Lecture Notes on Cryptography
(S. Goldwasser, M. Bellare)
Complete theory with a focus on security arguments
Weger24
The Mysterious Case of Code Equivalence
(V. Weger)
Introduction to most subclasses of the Code Equivalence Problem