About 19 results
Open links in new tab
  1. FrodoKEM

    FrodoKEM, at level 3 and 5, is one of two post-quantum algorithms recommended by the German Federal Office for Information Security (BSI) as cryptographically suitable for long-term …

    Missing:
    • public key
    Must include:
  2. FrodoKEM using WASM with JavaScript - asecuritysite.com

    For FrodoKEM-640-SHAKE, we can see that the size of Alice's public key is 9,616 bytes long, and her private key is 19,888 bytes long. The ciphertext passed is 9,270 bytes long.

  3. FrodoKEM | Open Quantum Safe

    Algorithm type: Key encapsulation mechanism. Main cryptographic assumption: learning with errors (LWE). Principal submitters: Michael Naehrig, Erdem Alkim, Joppe Bos, Léo Ducas, …

  4. GitHub - kuking/go-frodokem: Golang FrodoKEM implementation

    This implementation passes all KAT tests from the reference specification for all defined key sizes (640 / 976 / 1344) and variants (AES / SHAKE).

  5. FrodoKEM-640: targets Level 1 security (≥ AES-128). FrodoKEM-976: targets Level 3 security (≥ AES-192). Other parameterizations are easy, by changing compile-time constants. breaking …

  6. FrodoKEM: Learning with errors key encapsulation

    Sep 30, 2020 · Size (in bytes) of inputs and outputs of FrodoKEM. This submission defines a family of key-encapsulation mechanisms (KEMs), collectively called FrodoKEM.

  7. FrodoKEM Guide - Kyber Club

    He pastes Alice's public key into the text box or uploads the public key file. Then, he enters the data to encapsulate - either by pasting text (up to 1KB) or uploading a file (up to 5MB, such as …

  8. Sep 30, 2020 · Concretely, FrodoKEM is designed for IND-CCA security at three levels: FrodoKEM-640, which targets Level 1 in the NIST call for proposals (matching or exceeding …

  9. FrodoKEM: Learning with Errors Key Encapsulation - GitHub

    Concretely, this library includes the following KEM schemes using AES128 for the generation of the public matrix "A": FrodoKEM-640-AES and eFrodoKEM-640-AES: matching the post …

  10. FrodoKEM - Microsoft Research

    FrodoKEM achieves chosen-ciphertext (IND-CCA) security by applying a transformation to the IND-CPA-secure FrodoPKE scheme. Complete details about the design and performance of …