Chen, M.-S., Hulsing, A., Rijneveld, J., Samardjiska, S.,
and Schwabe, P. (2019c). MQDSS 2nd Round Sub-
mission. Technical report.
Crockett, E., Paquin, C., and Stebila, D. (2019). Prototyping
post-quantum and hybrid key exchange and authenti-
cation in TLS and SSH.
Czypek, P., Heyse, S., and Thomae, E. (2012). Efficient
implementations of MQPKS on constrained devices.
In Lecture Notes in Computer Science (including sub-
series Lecture Notes in Artificial Intelligence and Lec-
ture Notes in Bioinformatics).
D’Anvers, J.-P., Karmakar, A., Roy, S. S., and Vercauteren,
F. (2019). SABER: Mod-LWR based KEM (Round 2
Submission). Technical report.
De Feo, L., Jao, D., and Pl
ˆ
ut, J. (2014). Towards quantum-
resistant cryptosystems from supersingular elliptic
curve isogenies. Journal of Mathematical Cryptology.
Ducas, L., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky,
V., Schwabe, P., Seiler, G., and Damien, S. (2019).
CRYSTALS-Dilithium. Technical report.
Garey, M. R. and Johnson, D. S. (1979). A Guide to the
Theory of NP-Completeness.
Jao, D., Azarderakhsh, R., Campagna, M., Costello, C.,
Feo, L. D., Hess, B., Jalali, A., Koziel, B., LaMac-
chia, B., Naehrig, M., Pereira, G., Soukharev, V., and
Urbanik, D. (2019). Supersingular Isogeny Key En-
capsulation. Technical report.
Johansson, R. and Strahl, T. (2016). Post-quantum Secure
Communication on a Low Performance IoT Platform.
PhD thesis, Lund.
Kannwischer, M. J., Rijneveld, J., Schwabe, P., and Stof-
felen, K. (2019). pqm4: Testing and Benchmarking
NIST PQC on ARM Cortex-M4. Technical report.
Karmakar, A., Mera, J. M. B., Roy, S. S., and Verbauwhede,
I. (2018). Saber on ARM: CCA-secure module lattice-
based key encapsulation on ARM. IACR Transactions
on Cryptographic Hardware and Embedded Systems,
(3):243–266.
Kipnis, A., Patarin, J., and Goubin, L. (1999). Unbalanced
Oil and Vinegar Signature Schemes.
K
¨
olbl, S., Lauridsen, M. M., Mendel, F., and Rechberger,
C. (2017). Haraka v2 – Efficient Short-Input Hashing
for Post-Quantum Applications. IACR Transactions
on Symmetric Cryptology.
Lyubashevsky, V., Peikert, C., and Regev, O. (2010). On
ideal lattices and learning with errors over rings. In
Lecture Notes in Computer Science (including sub-
series Lecture Notes in Artificial Intelligence and Lec-
ture Notes in Bioinformatics).
Malina, L., Popelova, L., Dzurenda, P., Hajny, J., and
Martinasek, Z. (2018). On Feasibility of Post-
Quantum Cryptography on Small Devices. IFAC-
PapersOnLine, 51(6):462–467.
Matsumoto, T. and Imai, H. (1988). Public quadratic
polynomial-tuples for efficient signature-verification
and message-encryption. In Lecture Notes in Com-
puter Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinfor-
matics).
McEliece, R. J. (1978). A Public-Key Cryptosystem Based
On Algebraic Coding Theory.
Micciancio, D. and Goldwasser, S. (2002). Complexity
of Lattice Problems: A Cryptographic Perspective.
Kluwer.
Misoczki, R., Tillich, J. P., Sendrier, N., and Barreto,
P. S. (2013). MDPC-McEliece: New McEliece vari-
ants from Moderate Density Parity-Check codes. In
IEEE International Symposium on Information The-
ory - Proceedings.
NIST (2002). FIPS 180-2: Announcing the Secure Hash
Standard. FIPS.
NIST (2015). Secure Hash Standard (SHS) (FIPS PUB 180-
4). Federal Information Processing Standards Publi-
cation.
Peikert, C. (2016). A decade of lattice cryptography. Foun-
dations and Trends in Theoretical Computer Science,
10(4):283–424.
Poppelmann, T., Alkim, E., Avanzi, R., Bos, J., Ducas, L.,
de la Piedra, A., Schwabe, P., Stebila, D., Albrecht,
M. R., Orsini, E., Osheter, V., Paterson, K. G., Peer,
G., and Smart, N. P. (2019). NewHope Specification.
Technical report.
Regev, O. (2009). On lattices, learning with errors, random
linear codes, and cryptography. Journal of the ACM.
Seo, H., Jalali, A., and Azarderakhsh, R. (2019). Optimized
SIKE Round 2 on 64-bit ARM. Technical report.
Shor, P. W. (2003). Polynomial-Time Algorithms for Prime
Factorization and Discrete Logarithms on a Quantum
Computer. SIAM Journal on Computing, 26(5):1484–
1509.
Stebila, D. and Mosca, M. (2017). Post-Quantum Key Ex-
change for the Internet and the Open Quantum Safe
Project. Lecture Notes in Computer Science (includ-
ing subseries Lecture Notes in Artificial Intelligence
and Lecture Notes in Bioinformatics), pages 14–37.
Suomalainen, J., Kotelba, A., Kreku, J., and Lehtonen, S.
(2018). Evaluating the Efficiency of Physical and
Cryptographic Security Solutions for Quantum Im-
mune IoT. Cryptography.
Vatjus-Anttila, J., Kreku, J., Korpi, J., Khan, S., Saasta-
moinen, J., and Tiensyrj
¨
a, K. (2013). Early-phase per-
formance exploration of embedded systems with AB-
SOLUT framework. Journal of Systems Architecture.
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
561