Technical Research

Our scientists publish technical research across cybersecurity, the physical sciences, and Large Quantitative Models, sharing new work with the global research community through journals, conferences, and preprints.

Showing 0 results
of 0 publications.
highlight
Reset All

Type

Clear

Topic

Clear

Year

Clear

Conference

A Gaussian Leftover Hash Lemma for Modules over Number Fields

Date:

October 5, 2026

2026

Publication:

EUROCRYPT 2026

2026

Author(s):

Martin Albrecht, Joël Felderhoff, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo

Tags:

lattice-based cryptography, post-quantum cryptography, Leftover Hash Lemma, module lattices, discrete Gaussian, LWE, SIS, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Preprint

Nonequilibrium Chimeric Switching (NEX) Stabilizes Binding Free Energy Calculations Across Chemical Space

Date:

April 5, 2026

2026

Publication:

ChemRxiv

2026

Author(s):

Mary Pitman, Amogh Sood, Dominic Rufa, Lee Huntington

Tags:

Topic:

Preprint

AQVolt26: High-Temperature r2 SCAN Halide Dataset for Universal ML Potentials and Solid-State Batteries

Date:

April 2, 2026

2026

Publication:

ArXiv

2026

Author(s):

Jiyoon Kim, Chuhong Wang, Aayush R. Singh, Tyler Sours, Shivang Agarwal, AJ Nish, Paul Abruzzo, Ang Xiao, Omar Alla

Tags:

Topic:

Conference

Emergency Department Triage of Patients with Suspected Acute Coronary Syndrome using Unshielded Magnetocardiography

Date:

March 27, 2026

2026

Publication:

JACC

2026

Author(s):

Leroy, A., Maidens, J., Tam, S., Trier, H., John, S., LeDang, M., Iwata, G., Blumenthal, T., Au-Yeung, K. Y., Bhatt, D. L., & Bander, J. A

Tags:

Topic:

Conference

Machine Learning-based Detection of Coronary Artery Disease using Unshielded Magnetocardiography

Date:

March 27, 2026

2026

Publication:

JACC

2026

Author(s):

Amaury Leroy, John Maidens, Ghasaq Saleh, Abdullah Al-Abcha, Agata Sularz, Maggie LeDang, Simon Tam, Mohamad Adnan Alkhouli

Tags:

Topic:

Preprint

On Improving Experimental Binding Affinity Predictions with Synthetic Data

Date:

March 4, 2026

2026

Publication:

bioRxiv

2026

Author(s):

Kevin Ryczko, Phyo Phyo Zin, Jordan Crivelli-Decker, Ly Le, Punit K. Jha, Benjamin J. Shields, Pablo Lemos, Sasaank Bandi, Maarten van Damme, Amogh Sood, Lee Huntington, Mary Pitman, Martin Ganahl, Andrea Bortolato

Tags:

Topic:

Conference

Can Machines Design Antibodies Faster and Better than Biology?

Date:

February 25, 2026

2026

Publication:

Sanibel Symposium

2026

Author(s):

Punit K. Jha, Sheenam Khuttan, Alex Brueckner, Benjamin Shields, Amogh Sood, Patrick Rowe, Andrea Bortolato, Mary Pitman

Tags:

Topic:

Preprint

Feistel Tools: Reprogramming and Query-Recording for QRPs

Date:

January 30, 2026

2026

Publication:

IACR eprint

2026

Author(s):

Yu-Hsuan Huang, Andreas Hülsing, Silvia Ritsch, Abishanka Saha

Tags:

quantum random oracle model, random permutation model, Feistel network, Fiat-Shamir, post-quantum security, zero-knowledge proofs, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Preprint

Conference

Completing the Chain: Verified Implementations of Hash-Based Signatures and Their Security

Date:

January 27, 2026

2026

Publication:

IACR eprint and TCHES'26

2026

Author(s):

Manuel Barbosa, François Dupressoir, Andreas Hülsing, Rui Fernandes, Matthias Meijers, Pierre-Yves Strub

Tags:

hash-based signatures, formal verification, XMSS, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

GP34A-06 Crustal Fourier Analysis Driven Sensor Requirements for Magnetic Anomaly-aided Navigation

Date:

December 17, 2025

2025

Publication:

AGU25

2025

Author(s):

Andrew (Sosa) Sosanya, Jonathan, Ouellet, Regupathi Angappan, Alexander McNeil, Sriharsha Thoram, Prasenjit Sengupta

Tags:

Topic:

Conference

How Hard Can It Be to Formalize a Proof? Lessons from formalizing CryptoBox three times in EasyCrypt.

Date:

December 8, 2025

2025

Publication:

ASIACRYT 2025

2025

Author(s):

Francois Dupressoir, Andreas H¨ulsing, Cameron Low, Matthias Meijers, Charlotte Mylog, Sabine Oechsner

Tags:

formal verification, EasyCrypt, cryptographic proofs, implementation security, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally

Date:

December 8, 2025

2025

Publication:

ASIACRYPT 2025

2025

Author(s):

Martin Albrecht, Sasha Laphia, Russell Lai, Ivy Woo

Tags:

lattice-based cryptography, trapdoor sampling, threshold cryptography, post-quantum cryptography, LWE, SIS, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Conference

Preprint

Hybrid-Query Bounds with Partial Input Control – Framework and Application to Tight M-eTCR

Date:

December 8, 2025

2025

Publication:

ASIACRYPT 2025, IACR eprint

2025

Author(s):

Andreas Huelsing, Mikhail Kudinov, Christian Majenz

Tags:

quantum random oracle model, hash function security, collision resistance, hash-based signatures, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Journal

A Horizontal Accuracy Metric for Magnetic Navigation

Date:

December 1, 2025

2025

Publication:

ION

2025

Author(s):

Prasenjit Sengupta

Tags:

Topic:

Conference

Jazzline: Composable CryptoLine Functional Correctness Proofs for Jasmin Programs

Date:

October 13, 2025

2025

Publication:

ACM Conference on Computer and Communications Security (CCS), CCS 2025

2025

Author(s):

José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Lionel Blatter, Gustavo Delerue, João Diogo Duarte, Benjamin Gregoire, Tiago Oliveira, Miguel Quaresma, Pierre-Yves Strub, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang

Tags:

formal verification, Jasmin, CryptoLine, implementation security, cryptographic implementations, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Journal

Conference

Quantum CCA-Secure PKE, Revisited

Date:

September 18, 2025

2025

Publication:

Journal of Cryptology, PKC 2024

2025

Author(s):

Navid Alamati and Varun Maram

Tags:

public-key encryption, CCA security, post-quantum security, quantum adversaries, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code

Date:

September 14, 2025

2025

Publication:

TCHES25

2025

Author(s):

Santiago Arranz-Olmos, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, Peter Schwabe

Tags:

constant-time implementation, side-channel resistance, Jasmin, secure compilation, implementation security, AQtive Guard, cybersecurity, encryption, cryptography, side-channel security

Topic:

Preprint

Hyperdeterminants are Hard in Four Dimensions

Date:

September 7, 2025

2025

Publication:

ECCC Electronic Colloquim on Computaional Complexity

2025

Author(s):

Anand Kumar Narayanan

Tags:

hyperdeterminants, tensor isomorphism, computational complexity, algebraic geometry, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

Post-Quantum Online/Offline Signatures

Date:

August 28, 2025

2025

Publication:

CT-RSA 2025

2025

Author(s):

Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan

Tags:

digital signatures, post-quantum cryptography, online/offline signatures, lattice-based cryptography, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Journal

Breaking Down Per- and Polyfluoroalkyl Substances (PFAS): Tackling Multitudes of Correlated Electrons

Date:

August 21, 2025

2025

Publication:

Chemical Science

2025

Author(s):

Alan E Rask, Lee Huntington, SungYeon Kim, David Walker, Andrew Wildman, Rodrigo Wang, Nicole Hazel, Alan Judi, James T Pegg, Punit K Jha, Zara Mayimfor, Carl Dukatz, Hassan Naseri, Ilan Gleiser, Maxime R Hugues, Paul Zimmerman, Arman Zaribafiyan, Rudi Plesch, Takeshi Yamazaki

Tags:

Topic:

Conference

Journal

Preprint

Strong Keys for Tensor Isomorphism Cryptography

Date:

August 20, 2025

2025

Publication:

MFCS 2025, IACR eprint

2025

Author(s):

Anand Kumar Narayanan

Tags:

tensor isomorphism, algebraic cryptography, post-quantum cryptography, computational complexity, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Journal

Molecular Insights into Lithium-Ion Coordination and Morphology in Carbonate Polymer Electrolytes

Date:

August 18, 2025

2025

Publication:

Chemistry of Materials

2025

Author(s):

Omar Allam, Seung Soon Jang

Tags:

Topic:

Preprint

Starfighters — on the General Applicability of X-Wing

Date:

August 1, 2025

2025

Publication:

Cryptology ePrint Archive

2025

Author(s):

Deirdre Connolly, Kathrin Hövelmanns, Andreas Hülsing, Stavros Kousidis, Matthias Meijers

Tags:

hybrid key encapsulation, KEM combiner, post-quantum cryptography, X-Wing, MLKEM, AQtive Guard, cybersecurity, encryption, cryptography, key exchange

Topic:

Preprint

SAIR: Enabling Deep Learning for Protein-Ligand Interactions with a Synthetic Structural Dataset

Date:

June 21, 2025

2025

Publication:

bioRxiv

2025

Author(s):

Pablo Lemos, Zane Beckwith, Sasaank Bandi, Maarten van Damme, Jordan Crivelli-Decker, Benjamin J. Shields, Thomas Merth, Punit K. Jha, Nicola De Mitri, Tiffany J. Callahan, AJ Nish, Paul Abruzzo, Romelia Salomon-Ferrer, Martin Ganahl

Tags:

Topic:

Journal

Preprint

Guided Multi-Objective Generative AI to Enhance Structure-Based Drug Design

Date:

May 29, 2025

2025

Publication:

Chemical Science, ArXiv

2025

Author(s):

Amit Kadan, Kevin Ryczko, Erika Lloyd, Adrian Roitbergb, Takeshi Yamazaki

Tags:

Topic:

Conference

Proving Faster Implementations Faster: Combining Deductive and Circuit-Based Reasoning in EasyCrypt

Date:

May 12, 2025

2025

Publication:

IEEE SnP 2025

2025

Author(s):

José Carlos Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luís Esquível, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub

Tags:

formal verification, EasyCrypt, implementation security, deductive verification, circuit reasoning, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE

Date:

May 4, 2025

2025

Publication:

EUROCRYPT 2025

2025

Author(s):

Martin R. Albrecht, Benjamin Benčina, Russell W. F. Lai,

Tags:

updatable encryption, LWE, lattice-based cryptography, post-quantum cryptography, secure messaging, key management, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Preprint

Trapdoor One-way Functions From Tensors

Date:

April 7, 2025

2025

Publication:

IACR eprint

2025

Author(s):

Anand Kumar Narayanan

Tags:

tensor-based cryptography, trapdoor functions, post-quantum cryptography, algebraic cryptography, tensor isomorphism, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

Preprint

Protecting Cryptographic Code Against Spectre-RSB

Date:

March 30, 2025

2025

Publication:

ASPLOS 2025, Cryptology ePrint Archive

2025

Author(s):

Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, Zhiyuan Zhang

Tags:

side-channel attacks, Spectre, cryptographic implementation security, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Preprint

Orbital Optimization of Large Active Spaces via AI-Accelerators

Date:

March 26, 2025

2025

Publication:

ArXiv

2025

Author(s):

Örs Legeza, Andor Menczer, Ádám Ganyecz, Miklós Antal Werner, Kornél Kapás, Jeff Hammond, Sotiris S. Xantheas, Martin Ganahl, Frank Neese

Tags:

Topic:

Conference

Post-Quantum Cryptographic Analysis of SSH

Date:

March 26, 2025

2025

Publication:

RWC 2025

2025

Author(s):

Benjamin Benčina, Benjamin Dowling, Varun Maram, Keita Xagawa

Tags:

Topic:

Conference

Field Experiments on Post-Quantum DNSSEC

Date:

March 25, 2025

2025

Publication:

RWC 2025

2025

Author(s):

Jason Goertzen, Carlos Aguilar Melchor, Shumon Huque ,Peter Thomassen, Nils Wisiol

Tags:

DNSSEC, post-quantum cryptography, DNS security, network security, cryptographic protocols, deployment, AQtive Guard, cybersecurity, encryption, cryptography, network security

Topic:

Preprint

CAKE Requires Programming – On the Provable Post-Quantum Security of (O)CAKE

Date:

March 12, 2025

2025

Publication:

IACR eprint

2025

Author(s):

Kathrin Hövelmanns, Andreas Hülsing, Mikhail Kudinov, Silvia Ritsch

Tags:

password-authenticated key exchange, PAKE, post-quantum cryptography, quantum random oracle model, AQtive Guard, cybersecurity, encryption, cryptography, key exchange

Topic:

Conference

(Un)breakable Curses – Re-Encryption in the Fujisaki-Okamoto Transform

Date:

February 21, 2025

2025

Publication:

EUROCRYPT 2025

2025

Author(s):

Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz, Fabrizio Sisinni

Tags:

Fujisaki-Okamoto transform, KEM, post-quantum security, quantum random oracle model, re-encryption, side-channel attacks, AQtive Guard, cybersecurity, encryption, cryptography, key exchange

Topic:

Preprint

The Magnitude of Categories of Texts Enriched by Language Models

Date:

January 22, 2025

2025

Publication:

ArXiv

2025

Author(s):

Tai-Danae Bradley, Juan Pablo Vigneaux

Tags:

Topic:

Conference

Leakage-Free Probabilistic Jasmin Programs

Date:

January 20, 2025

2025

Publication:

CPP 2025

2025

Author(s):

José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh

Tags:

formal verification, Jasmin, side-channel leakage, probabilistic programs, implementation security, AQtive Guard, cybersecurity, encryption, cryptography, side-channel security

Topic:

Journal

Accelerating Quantum Imaginary-Time Evolution with Random Measurements

Date:

January 14, 2025

2025

Publication:

Physical Review A

2025

Author(s):

Ioannis Kolotouros, David Joseph, and Anand Kumar Narayanan

Tags:

quantum computing, quantum simulation, imaginary-time evolution, variational quantum algorithms, random measurements, Large Quantitative Models, artificial intelligence, AI, simulation, machine learning, physics

Topic:

Journal

Preprint

Scaling Lattice Sieves across Multiple Machines

Date:

January 13, 2025

2025

Publication:

Communications in Cryptology, Cryptology ePrint Archive

2025

Author(s):

Martin R. Albrecht, Joe Rowell

Tags:

lattice sieving, lattice reduction, cryptanalysis, distributed computing, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Conference

A High Dimensional Cramer's Rule Connecting Homogeneous Multilinear Equations to Hyperdeterminants

Date:

January 7, 2025

2025

Publication:

ITCS - Innovations in Theoretical Computer Science

2025

Author(s):

Antoine Joux, Anand Kumar Narayanan

Tags:

hyperdeterminants, algebraic geometry, multilinear equations, tensor isomorphism, computational complexity, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Preprint

Towards Structure-Preserving Quantum Encodings

Date:

December 23, 2024

2024

Publication:

ArXiv

2024

Author(s):

Arthur J. Parzygnat, Tai-Danae Bradley, Andrew Vlasic, Anh Pham

Tags:

Topic:

Conference

GP41B-05 Navigating through Magnetic Interference from Magnetospheric-Ionospheric Signals with AI

Date:

December 12, 2024

2024

Publication:

AGU24

2024

Author(s):

Regupathi Angappan, Favour Nerrisse, Kimberly Moore

Tags:

Topic:

Conference

GP41B-06 Determining Geophysical Map Requirements for Magnetic Navigation using Cramér Rao Lower Bound Analysis

Date:

December 12, 2024

2024

Publication:

AGU24

2024

Author(s):

Sriharsha Thoram, Richard Phernetton, Regupathi Angappan, Favour Nerrisse, Kimberly Moore, Jackson Bell, Aditya Gupta, Alexander McNeil, Ken Devine

Tags:

Topic:

Conference

Preprint

Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic

Date:

December 9, 2024

2024

Publication:

ASIACRYPT 2024, Cryptology ePrint Archive

2024

Author(s):

Mariya Georgieva Belorgey, Sergiu Carpov, Nicolas Gama, Sandra Guasch, Dimitar Jetchev

Tags:

fully homomorphic encryption, FHE, key decomposition, lattice-based cryptography, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, homomorphic encryption

Topic:

Conference

Preprint

A Tight Security Proof for SPHINCS+, Formally Verified

Date:

December 9, 2024

2024

Publication:

ASIACRYPT 2024, Cryptology ePrint Archive

2024

Author(s):

Manuel Barbosa, François Dupressoir, Andreas Hülsing, Matthias Meijers, and Pierre-Yves Strub

Tags:

hash-based signatures, SPHINCS+, formal verification, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-ish and Thresholdisable

Date:

December 9, 2024

2024

Publication:

ASIACRYPT 2024

2024

Author(s):

Martin R. Albrecht, Kamil Doruk Gur

Tags:

verifiable oblivious PRF, lattice-based cryptography, threshold cryptography, post-quantum cryptography, OPRF, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Conference

AI and Quantum Sensors: Realization of a Safe and Effective Unshielded Bedside Magnetocardiogram to Detect Ischemia in the Emergency Room

Date:

November 11, 2024

2024

Publication:

AHA

2024

Author(s):

Geoffrey Iwata, Kirstin Aschbacher, Sajiny John, Simon Tam, Kit Yee Au-Yeung, Johanna Contreras, Deepak Bhatt, Jeffrey Bander

Tags:

Topic:

Journal

Preprint

On Finding Dense Sub-Lattices as Low Energy States of a Quantum Hamiltonian

Date:

November 7, 2024

2024

Publication:

Physical Review Research, ArXiv

2024

Author(s):

Júlia Barberà-Rodríguez, Nicolas Gama, Anand Kumar Narayanan, David Joseph

Tags:

quantum algorithms, lattice cryptanalysis, quantum Hamiltonian, post-quantum cryptography, lattice problems, AQtive Guard, cybersecurity, encryption, cryptography, quantum computing

Topic:

Journal

Grover's Oracle for the Shortest Vector Problem and its Application in Hybrid Classical-Quantum Solvers

Date:

November 7, 2024

2024

Publication:

IEEE Transactions on Quantum Engineering

2024

Author(s):

Milos Prokop, Petros Wallden, David Joseph

Tags:

quantum computing, Grover's algorithm, shortest vector problem, lattice cryptanalysis, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, quantum computing

Topic:

Preprint

Retentive Neural Quantum States: Efficient Ansätze for Ab Initio Quantum Chemistry

Date:

November 6, 2024

2024

Publication:

ArXiv

2024

Author(s):

Oliver Knitter, Dan Zhao, James Stokes, Martin Ganahl, Stefan Leichenauer, Shravan Veerapaneni

Tags:

Topic:

Conference

Lower Bounds on Magnetic Navigation Performance as a Function of Magnetic Anomaly Map Quality

Date:

September 29, 2024

2024

Publication:

DASC

2024

Author(s):

Aditya Gupta, Prasenjit Sengupta, Richard Phernetton, Andrew (Sosa) Sosanya

Tags:

Topic:

Journal

Parallel Implementation of the Density Matrix Renormalization Group Method Achieving a Quarter petaFLOPS Performance on a Single DGX-H100 GPU Node

Date:

September 29, 2024

2024

Publication:

Journal of Chemical Theory and Computation

2024

Author(s):

Andor Menczer, Maarten van Damme, Alan Rask, Lee Huntington, Jeff Hammond, Sotiris S. Xantheas, Martin Ganahl, Örs Legeza

Tags:

Topic:

Conference

Preprint

TurboTLS: TLS Connection Establishment With 1 Less Round Trip

Date:

September 16, 2024

2024

Publication:

ESORICS 2024, ArXiv

2024

Author(s):

Carlos Aguilar-Melchor, Thomas Bailleux, Jason Goertzen, Adrien Guinet, David Joseph, Douglas Stebila

Tags:

TLS, protocol security, key exchange, post-quantum cryptography, network security, AQtive Guard, cybersecurity, encryption, cryptography, network security

Topic:

Conference

SDitH in Hardware

Date:

September 4, 2024

2024

Publication:

TCHES 2024

2024

Author(s):

Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue

Tags:

MPC-in-the-head, syndrome decoding, post-quantum cryptography, digital signatures, hardware implementation, AQtive Guard, cybersecurity, encryption, cryptography, hardware security

Topic:

Journal

Bedside Magnetocardiography with a Scalar Sensor Array

Date:

August 21, 2024

2024

Publication:

Sensors

2024

Author(s):

Geoffrey Z. Iwata, Christian T. Nguyen, Kevin Tharratt, Maximilian Ruf, Tucker Reinhardt, Jordan Crivelli-Decker, Madelaine S. Z. Liddy, Alison E. Rugar, Frances Lu, Kirstin Aschbacher, Ethan J. Pratt, Kit Yee Au-Yeung and Stefan Bogdanovic

Tags:

Topic:

Conference

On Round Elimination for Special-Sound Multi-Round Identification and the Generality of the Hypercube for MPCitH

Date:

August 18, 2024

2024

Publication:

CRYPTO 2024

2024

Author(s):

Andreas Huelsing, David Joseph, Christian Majenz, Anand Narayanan

Tags:

MPC-in-the-head, post-quantum cryptography, digital signatures, zero-knowledge proofs, identification protocols, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

Preprint

Quantum Lattice Enumeration in Limited Depth

Date:

August 18, 2024

2024

Publication:

CRYPTO 2024, Cryptology ePrint Archive

2024

Author(s):

Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia

Tags:

quantum computing, lattice enumeration, lattice cryptanalysis, post-quantum cryptography, shortest vector problem, AQtive Guard, cybersecurity, encryption, cryptography, quantum computing

Topic:

Conference

Formally Verifying Kyber Episode V: Machine-checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt

Date:

August 18, 2024

2024

Publication:

CRYPTO 2024

2024

Author(s):

José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Pierre-Yves Strub

Tags:

formal verification, EasyCrypt, ML-KEM, Kyber, post-quantum cryptography, IND-CCA security, AQtive Guard, cybersecurity, encryption, cryptography, NIST PQC standard

Topic:

Journal

Preprint

Machine Learning Guided AQFEP: A Fast and Efficient Absolute Free Energy Perturbation Solution for Virtual Screening

Date:

August 15, 2024

2024

Publication:

Journal of Chemical Theory and Computation, ChemRxiv

2024

Author(s):

Jordan E. Crivelli-Decker, Zane Beckwith, Gary Tom, Ly Le, Sheenam Khuttan, Romelia Salomon-FerrerJackson Beall, Rafael Gómez-Bombarelli, Andrea Bortolato

Tags:

Topic:

Preprint

Non-Unitary Coupled Cluster Enabled by Mid-circuit Measurements on Quantum Computers

Date:

July 17, 2024

2024

Publication:

ArXiv

2024

Author(s):

Alexandre Fleury, James Brown, Erika Lloyd, Maritza Hernandez, Isaac H. Kim

Tags:

Topic:

Preprint

Parallel Implementation of the Density Matrix Renormalization Group Method Achieving a Quarter petaFLOPS Performance on a Single DGX-H100 GPU Node

Date:

July 10, 2024

2024

Publication:

ArXiv

2024

Author(s):

Andor Menczer, Maarten van Damme, Alan Rask, Lee Huntington, Jeff Hammond, Sotiris S. Xantheas, Martin Ganahl, Örs Legeza

Tags:

Topic:

Conference

Preprint

SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions

Date:

May 29, 2024

2024

Publication:

EUROCRYPT 2024, Cryptology ePrint Archive

2024

Author(s):

Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen

Tags:

polynomial commitments, lattice-based cryptography, zero-knowledge proofs, post-quantum cryptography, succinct proofs, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Conference

Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants

Date:

May 29, 2024

2024

Publication:

EUROCRYPT 2024

2024

Author(s):

Anand Kumar Narayanan, Youming Qiao, Gang Tang

Tags:

algebraic cryptography, matrix code equivalence, tensor isomorphism, post-quantum cryptography, computational complexity, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Preprint

Conference

Crypto Dark Matter on the Torus: Oblivious PRFs from Shallow PRFs and FHE

Date:

May 29, 2024

2024

Publication:

Cryptology ePrint Archive, EUROCRYPT 2024

2024

Author(s):

Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham

Tags:

oblivious PRF, fully homomorphic encryption, FHE, lattice-based cryptography, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, homomorphic encryption

Topic:

Conference

Preprint

Batch Signatures, Revisited

Date:

May 6, 2024

2024

Publication:

CT-RSA 2024, Cryptology ePrint Archive

2024

Author(s):

Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano

Tags:

batch signatures, digital signatures, post-quantum cryptography, signature aggregation, hash-based signatures, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Preprint

X-Wing: The Hybrid KEM You’ve Been Looking For

Date:

April 29, 2024

2024

Publication:

Communications in Cryptology

2024

Author(s):

Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan

Tags:

hybrid key encapsulation, KEM combiner, X-Wing, post-quantum cryptography, MLKEM, X25519, AQtive Guard, cybersecurity, encryption, cryptography, key exchange

Topic:

Journal

The Structure of Meaning in Language: Parallel Narratives in Linear Algebra and Category Theory

Date:

February 1, 2024

2024

Publication:

The Notices of the American Mathematical Society

2024

Author(s):

Tai-Danae Bradley, Juan Luis Gastaldi, John Terilla

Tags:

natural language processing, linear algebra, category theory, language semantics, compositional semantics, mathematics, Large Quantitative Models, artificial intelligence, AI, simulation, machine learning, physics

Topic:

Preprint

Conference

Physics-Informed Calibration of Aeromagnetic Compensation in Magnetic Navigation Systems using Liquid Time-Constant Networks

Date:

January 17, 2024

2024

Publication:

ArXiv, Neurips

2024

Author(s):

Favour Nerrise, Andrew (Sosa) Sosanya, Patrick Neary

Tags:

Topic:

Preprint

Conference

SDitH in the QROM

Date:

December 20, 2023

2023

Publication:

Cryptology ePrint Archive, ASIACRYPT 2023

2023

Author(s):

Carlos Aguilar-Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue

Tags:

MPC-in-the-head, syndrome decoding, post-quantum cryptography, quantum random oracle model, digital signatures, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Conference

To Attest or Not to Attest, This is the Question – Provable Attestation in FIDO2

Date:

December 18, 2023

2023

Publication:

ASIACRYPT 2023

2023

Author(s):

Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen

Tags:

FIDO2, attestation, passwordless authentication, cryptographic protocols, privacy, AQtive Guard, cybersecurity, identity management, authentication, privacy

Topic:

Journal

Secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification

Date:

December 10, 2023

2023

Publication:

MLSystems @ NeurIPS 2023

2023

Author(s):

Spencer Giddens, Raphael Labaca-Castro, Dan Zhao, Sandra Guasch, Parth Mishra, Nicolas Gama

Tags:

encrypted traffic analysis, privacy, network security, machine learning, traffic classification, AQtive Guard, cybersecurity, encryption, network security, privacy, machine learning

Topic:

Journal

Accelerated Organic Crystal Structure Prediction with Genetic Algorithms and Machine Learning

Date:

December 7, 2023

2023

Publication:

Journal of Chemical Theory and Computation

2023

Author(s):

Amit Kadan, Kevin Ryczko, Andrew Wildman, Rodrigo Wang, Adrian Roitberg, Takeshi Yamazaki

Tags:

Topic:

Conference

When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications

Date:

December 7, 2023

2023

Publication:

Network and Distributed Systems Security Symposium (NDSS) 2024

2023

Author(s):

Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy

Tags:

post-quantum cryptography, vehicle-to-vehicle communications, authentication, V2V, digital signatures, deployment, AQtive Guard, cybersecurity, encryption, cryptography, authentication, network security

Topic:

Conference

An ERF Analog for Discrete Gaussian Sampling

Date:

August 29, 2023

2023

Publication:

Mathcrypt 2023

2023

Author(s):

Nicolas Gama, Anand Kumar Narayanan, Ryder LiuLin, Dongze Yue

Tags:

lattice-based cryptography, Gaussian sampling, post-quantum cryptography, discrete Gaussian, implementation, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Preprint

Massively Parallel Quantum Chemistry: PFAS on Over 1 Million Cloud vCPUs

Date:

July 20, 2023

2023

Publication:

ArXiv

2023

Author(s):

Alan E. Rask, Lee Huntington, SungYeon Kim, David Walker, Andrew Wildman, Rodrigo Wang, Nicole Hazel, Alan Judi, James T. Pegg, Punit K. Jha, Zara Mayimfor, Carl Dukatz, Hassan Naseri, Ilan Gleiser, Maxime R. Hugues, Paul M. Zimmerman, Arman Zaribafiyan, Rudi Plesch, Takeshi Yamazaki

Tags:

Topic:

Preprint

Conference

Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7

Date:

July 20, 2023

2023

Publication:

ePrint, AfricaCrypt 2023

2023

Author(s):

James Howe, Bas Westerbaan

Tags:

post-quantum cryptography, benchmarking, NIST PQC, lattice-based signatures, embedded systems, ARM, AQtive Guard, cybersecurity, encryption, cryptography, NIST PQC standard

Topic:

Journal

Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic

Date:

July 11, 2023

2023

Publication:

Journal of Cryptology

2023

Author(s):

Mariya Georgieva Belorgey, Sergiu Carpov, Kevin Deforth, Dimitar Jetchev, Abson Sae-Tang, Marius Vuille, Nicolas Gama, Jon Katz, Iraklis Leontiadis & Mohsen Mohammadi

Tags:

multiparty computation, MPC, secure computation, privacy-preserving computation, boolean arithmetic, AQtive Guard, cybersecurity, encryption, privacy, secure computation

Topic:

Conference

Performance of a Novel Unshielded Magnetocardiography Device in a First-in-Human Study

Date:

June 11, 2023

2023

Publication:

AHA

2023

Author(s):

Frances Lu, Justin Cortez, Jason Ku, Geoffrey Z Iwata, Ethan J Pratt, Kit Yee Au-Yeung, and Clifton Wat

Tags:

Topic:

Conference

Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation

Date:

June 6, 2023

2023

Publication:

WAHC 2023

2023

Author(s):

Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin

Tags:

federated learning, secure aggregation, privacy-preserving machine learning, GPU implementation, AES, AQtive Guard, cybersecurity, encryption, privacy, machine learning, artificial intelligence

Topic:

Preprint

Calculating Potential Energy Surfaces with Quantum Computers by Measuring Only the Density Along Adiabatic Transitions

Date:

May 15, 2023

2023

Publication:

ArXiv

2023

Author(s):

James Brown

Tags:

Topic:

Conference

Preprint

The Return of the SDitH

Date:

April 23, 2023

2023

Publication:

EUROCRYPT 2023, Cryptology ePrint Archive

2023

Author(s):

Carlos Aguilar-Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue

Tags:

MPC-in-the-head, syndrome decoding, post-quantum cryptography, digital signatures, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Preprint

A Note on Hybrid Signature Schemes

Date:

March 23, 2023

2023

Publication:

Cryptology ePrint Archive

2023

Author(s):

Nina Bindel, Britta Hale

Tags:

hybrid signatures, digital signatures, post-quantum cryptography, cryptographic agility, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Journal

Variational Quantum Solutions to the Shortest Vector Problem

Date:

March 2, 2023

2023

Publication:

Quantum Journal

2023

Author(s):

Martin R. Albrecht, Miloš Prokop, Yixin Shen, Petros Wallden

Tags:

quantum computing, shortest vector problem, variational quantum algorithms, lattice cryptanalysis, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, quantum computing

Topic:

Preprint

Iterative Qubit Coupled Cluster using Only Clifford Circuits

Date:

November 18, 2022

2022

Publication:

ArXiv

2022

Author(s):

James Brown, Marc P. Coons, Erika Lloyd, Alexandre Fleury, Krzysztof Bieniasz, Valentin Senicourt, Arman Zaribafiyan

Tags:

Topic:

Journal

The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices

Date:

October 28, 2022

2022

Publication:

The Computer Journal

2022

Author(s):

Nina Bindel, Sarah McCarthy

Tags:

lattice-based cryptography, certificates, post-quantum cryptography, digital signatures, implicit certificates, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Conference

Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC

Date:

October 20, 2022

2022

Publication:

CBCrypto 2022

2022

Author(s):

Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, and Kashif Nawaz

Tags:

code-based cryptography, HQC, hardware implementation, post-quantum cryptography, automated design, AQtive Guard, cybersecurity, encryption, cryptography, hardware security

Topic:

Conference

Neural Distillation as a State Representation Bottleneck in Reinforcement Learning

Date:

October 5, 2022

2022

Publication:

1st Conference on Lifelong Learning Agents

2022

Author(s):

Valentin Guillet, Dennis G. Wilson, Carlos Aguilar Melchor, Emmanuel Rachelson

Tags:

reinforcement learning, knowledge distillation, neural networks, machine learning, state representation, Large Quantitative Models, artificial intelligence, AI, simulation, machine learning, physics

Topic:

Conference

On Neural Consolidation for Transfer in Reinforcement Learning

Date:

October 5, 2022

2022

Publication:

IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning

2022

Author(s):

Valentin Guillet, Dennis G. Wilson, Carlos Aguilar Melchor, Emmanuel Rachelson

Tags:

reinforcement learning, transfer learning, neural networks, machine learning, Large Quantitative Models, artificial intelligence, AI, simulation, machine learning, physics

Topic:

Journal

Survey on Fully Homomorphic Encryption, Theory, and Applications

Date:

October 1, 2022

2022

Publication:

Proceedings of the IEEE

2022

Author(s):

Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank HP Fitzek, Najwa Aaraj

Tags:

fully homomorphic encryption, FHE, survey, lattice-based cryptography, privacy-preserving computation, AQtive Guard, cybersecurity, encryption, cryptography, homomorphic encryption

Topic:

Conference

Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange

Date:

September 25, 2022

2022

Publication:

European Symposium on Research in Computer Security

2022

Author(s):

Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding

Tags:

side-channel attacks, LWE, lattice-based cryptography, key exchange, signal leakage, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, side-channel security, key exchange

Topic:

Conference

Farasha: A Provable Permutation-Based Parallelizable PRF

Date:

September 5, 2022

2022

Publication:

SAC 2022

2022

Author(s):

Najwa Aaraj, Emanuele Bellin, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar

Tags:

pseudorandom function, permutation-based cryptography, symmetric cryptography, provable security, PRF, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Journal

Iterative Quantum Optimization with an Adaptive Problem - Hamiltonian for the Shortest Vector Problem

Date:

August 29, 2022

2022

Publication:

American Physical Society

2022

Author(s):

Yifeng Rocky Zhu, David Joseph, Cong Ling, and Florian Mintert

Tags:

quantum computing, iterative optimization, shortest vector problem, lattice cryptanalysis, quantum algorithms, AQtive Guard, cybersecurity, encryption, cryptography, lattice cryptography

Topic:

Conference

FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation

Date:

August 19, 2022

2022

Publication:

IEEE Symposium on Security and Privacy 2022

2022

Author(s):

Nina Bindel, Cas Cremers, Mang Zhao

Tags:

FIDO2, WebAuthn, passwordless authentication, post-quantum cryptography, protocol security, AQtive Guard, cybersecurity, identity management, authentication

Topic:

Journal

Post-Quantum Cryptographic Assemblages and the Governance of the Quantum Threat

Date:

August 16, 2022

2022

Publication:

Journal of Cybersecurity

2022

Author(s):

Kristen Csenkey, Nina Bindel

Tags:

post-quantum cryptography, governance, policy, quantum threat, cryptographic transition, AQtive Guard, cybersecurity, encryption, cryptography, quantum computing, policy

Topic:

Conference

Hybrid Decoding–Classical-Quantum Trade-Offs for Information Set Decoding

Date:

July 28, 2022

2022

Publication:

PQCrypto 2022

2022

Author(s):

Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I Latorre, Marc Manzano

Tags:

code-based cryptography, information set decoding, quantum algorithms, cryptanalysis, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, quantum computing

Topic:

Journal

Solving Systems of Boolean Multivariate Equations with Quantum Annealing

Date:

July 2, 2022

2022

Publication:

American Physical Society

2022

Author(s):

Sergi Ramos-Calderer, Carlos Bravo-Prieto, Ruge Lin, Emanuele Bellini, Marc Manzano, Najwa Aaraj, José I Latorre

Tags:

quantum computing, quantum annealing, multivariate equations, cryptanalysis, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, quantum computing

Topic:

Preprint

Tangelo: An Open-source Python Package for End-to-end Chemistry Workflows on Quantum Computers

Date:

June 24, 2022

2022

Publication:

ArXiv

2022

Author(s):

Valentin Senicourt, James Brown, Alexandre Fleury, Ryan Day, Erika Lloyd, Marc P. Coons, Krzysztof Bieniasz, Lee Huntington, Alejandro J. Garza, Shunji Matsuura, Rudi Plesch, Takeshi Yamazaki, Arman Zaribafiyan

Tags:

Topic:

Conference

LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals

Date:

June 23, 2022

2022

Publication:

PQCrypto 2022

2022

Author(s):

Carlos Aguilar Melchor, Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Gilles Zémor

Tags:

code-based cryptography, KEM, LRPC codes, post-quantum cryptography, AQtive Guard, cybersecurity, encryption, cryptography, key exchange

Topic:

Journal

Transitioning Organizations to Post-Quantum Cryptography

Date:

May 11, 2022

2022

Publication:

Nature

2022

Author(s):

David Joseph, Rafael Misoczki, Marc Manzano, Joe Tricot, Fernando Dominguez Pinuaga, Olivier Lacombe, Stefan Leichenauer, Jack Hidary, Phil Venables, Royal Hansen

Tags:

post-quantum cryptography, cryptographic transition, organizational security, migration, governance, AQtive Guard, cybersecurity, encryption, cryptography

Topic:

Journal

Optimizing Electronic Structure Simulations on a Trapped-ion Quantum Computer Using Problem Decomposition

Date:

November 18, 2021

2021

Publication:

Communications Physics

2021

Author(s):

Yukio Kawashima, Erika Lloyd, Marc P. Coons, Yunseong Nam, Shunji Matsuura, Alejandro J. Garza, Sonika Johri, Lee Huntington, Valentin Senicourt, Andrii O. Maksymov, Jason H. V. Nguyen, Jungsang Kim, Nima Alidoust, Arman Zaribafiyan & Takeshi Yamazaki

Tags:

Topic:

Journal

Scaling Up Electronic Structure Calculations on Quantum Computers: The Frozen Natural Orbital Based Method of Increments

Date:

July 16, 2021

2021

Publication:

The Journal of Chemical Physics

2021

Author(s):

Prakash Verma, Lee Huntington, Marc P. Coons, Yukio Kawashima, Takeshi Yamazaki, Arman Zaribafiyan

Tags:

Topic:

No results found.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.