Skip to main content

Showing 1–5 of 5 results for author: Barenghi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.16919  [pdf, other

    cs.CR cs.IT

    Bit-flip** Decoder Failure Rate Estimation for (v,w)-regular Codes

    Authors: Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi

    Abstract: Providing closed form estimates of the decoding failure rate of iterative decoder for low- and moderate-density parity check codes has attracted significant interest in the research community over the years. This interest has raised recently due to the use of iterative decoders in post-quantum cryptosystems, where the desired decoding failure rates are impossible to estimate via Monte Carlo simula… ▽ More

    Submitted 7 February, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

    Comments: Fixed typos: derivation of a from a=(x-y+v)/2 to a=(y-x+v)/2; replaced (x-y+v)/2 with (y-x+v)/2 and (x-y+v-1)/2 with (y-x+v-1)/2 in rho(x,y,l); replaced d+ with d- in the def. of delta-(d-); replaced epsilon01-l with l in zeta(tc,l,epsilon01) and epsilon11-l with l in lambda(tc,l,epsilon11) (apart from the def.s); explicited epsilon01 and epsilon11 in zeta and chi_odd

  2. arXiv:1912.05182  [pdf, ps, other

    cs.CR cs.IT

    A Code-specific Conservative Model for the Failure Rate of Bit-flip** Decoding of LDPC Codes with Cryptographic Applications

    Authors: Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce

    Abstract: Characterizing the decoding failure rate of iteratively decoded Low- and Moderate-Density Parity Check (LDPC/MDPC) codes is paramount to build cryptosystems based on them, able to achieve indistinguishability under adaptive chosen ciphertext attacks. In this paper, we provide a statistical worst-case analysis of our proposed iterative decoder obtained through a simple modification of the classic i… ▽ More

    Submitted 11 December, 2019; originally announced December 2019.

    MSC Class: 94A60

  3. Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree

    Authors: Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi

    Abstract: X.509 certificate parsing and validation is a critical task which has shown consistent lack of effectiveness, with practical attacks being reported with a steady rate during the last 10 years. In this work we analyze the X.509 standard and provide a grammar description of it amenable to the automated generation of a parser with strong termination guarantees, providing unambiguous input parsing. We… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    Journal ref: Journal of Computer Security, Volume 26, Issue 6, 30th October 2018

  4. arXiv:1807.06127  [pdf, ps, other

    cs.CR cs.IT

    Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes

    Authors: Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani

    Abstract: In this paper we consider a post-quantum digital signature scheme based on low-density generator matrix codes and propose efficient algorithmic solutions for its implementation. We also review all known attacks against this scheme and derive closed-form estimates of their complexity when running over both classical and quantum computers. Based on these estimates, we propose new parametrization for… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: 40 pages, 4 tables

  5. arXiv:1801.08867  [pdf, ps, other

    cs.CR cs.IT

    LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes

    Authors: Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini

    Abstract: This work presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density parity-check codes as secret codes, providing high decoding speeds and compact keypairs. LEDAkem uses ephemeral keys to foil known statistical attacks, and takes advantage of a new decoding algorithm that provides faster decoding… ▽ More

    Submitted 26 January, 2018; originally announced January 2018.

    Comments: 21 pages, 3 tables