Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by Daniel Smith-Tone

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 25 of 32

Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition

Rainbow Band Separation is Better than we Thought

Author(s)
Daniel C. Smith-Tone, Ray A. Perlner
Currently the National Institute of Standards and Technology (NIST) is engaged in a post- quantum standardization effort, analyzing numerous candidate schemes

Practical Cryptanalysis of k-ary C*

Author(s)
Daniel C. Smith-Tone
Recently, an article by Felke appeared in Cryptography and Communications discussing the security of biquadratic $C^*$ and a further generalization, k-ary $C^*$

Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)

Gorjan Alagic, Jacob M. Alperin-Sheriff, Daniel C. Apon, David A. Cooper, Quynh H. Dang, Carl A. Miller, Dustin Moody, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Yi-Kai Liu

The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public competition

HFERP -- A New Multivariate Encryption Scheme

Author(s)
Yashuhiko Ikematsu, Ray A. Perlner, Daniel C. Smith-Tone, Tsuyoshi Takagi, Jeremy Vates
In 2016, Yasuda et al.~presented a new multivariate encryption technique based on the Square and Rainbow primitives and utilizing the plus modifier that they

Improved Cryptanalysis of HFEv- via Projection

Author(s)
Jintai Ding, Ray A. Perlner, Albrecht R. Petzoldt, Daniel C. Smith-Tone
The HFEv- signature scheme is one of the most studied multivariate schemes and one of the major candidates for the upcoming standardization of post-quantum

Total Break of the SRP Encryption Scheme

Author(s)
Ray A. Perlner, Albrecht R. Petzoldt, Daniel C. Smith-Tone
Multivariate Public Key Cryptography (MPKC) is one of the main candidates for secure communication in a post-quantum era. Recently, Yasuda and Sakurai proposed

Key Recovery Attack for All Parameters of HFE-

Author(s)
Jeremy Vates, Daniel C. Smith-Tone
Recently, by an interesting confluence, multivariate schemes with the minus modifier have received attention as candidates for multivariate encryption. Among

Key Recovery Attack for ZHFE

Author(s)
Daniel Cabarcas, Daniel C. Smith-Tone, Javier A. Verbel
At PQCRYPTO 2014, Porras, Baena and Ding introduced ZHFE, an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization

An Updated Security Analysis of PFLASH

Author(s)
Ryann Cartor, Daniel C. Smith-Tone
One application in post-quantum cryptography that appears especially difficult is security for low-power or no-power devices. One of the early champions in this

Key Recovery Attack on Cubic Simple Matrix Encryption

Author(s)
Ray A. Perlner, Dustin Moody, Daniel C. Smith-Tone
In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple

Report on Post-Quantum Cryptography

Author(s)
Lidong Chen, Stephen P. Jordan, Yi-Kai Liu, Dustin Moody, Rene C. Peralta, Ray A. Perlner, Daniel C. Smith-Tone
In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical

Security Analysis and Key Modification for ZHFE

Author(s)
Ray A. Perlner, Daniel C. Smith-Tone
ZHFE, designed by Porras et al., is one of the few promising candidates for a multivariate public-key encryption algorithm. In this article we extend and

PFLASH - Secure Asymmetric Signatures on Smart Cards

Author(s)
Ming-Shing Chen, Bo-Yin Yang, Daniel C. Smith-Tone
We present PFLASH, an asymmetric digital signature scheme appropriate for smart card use. We present parameters for several security levels in this low resource