Advertisement · 728 × 90

Posts by Andrea Basso

A cluttered and complicated chart relating qubit counts to qubit error rates, comparing today's devices to cryptographic attacks.

A cluttered and complicated chart relating qubit counts to qubit error rates, comparing today's devices to cryptographic attacks.

Overdue quantum landscape update: sam-jaques.appspot.com/quantum_land...

A 2d chart can only say so much. tl;dr new results are still overhyped, but definitely worth taking seriously. This chart is based on surface codes and a big question now is whether new codes can be practical (=>useless chart)

1 week ago 48 19 1 2
Craptology debrisPrint Snarkive

In honor of April Fool's Day (which has already started in Australia), I offer you debrisprint.iacr.org for AI-generated cryptology content.

2 weeks ago 16 6 1 0
Preview
MaGIC 2026 - Marche Workshop on Group Actions in Cryptography A workshop dedicated to the study of cryptographic group actions, a rapidly evolving area at the intersection of algebraic geometry, number theory, and post-quantum cryptography. The workshop will bri...

We still have a few spots left at MaGIC!

Registration closes this week... Hurry up if you want to be on top of all the latest news on Cryptographic Group Actions!

magic-workshop.github.io

1 month ago 1 7 0 0

New PRISM improvements 🥳

We extended our PRISM paper to present two new variants: one that achieves strong unforgeability, and another that allows for smaller parameters and therefore faster signatures!

eprint.iacr.org/2026/443.pdf

1 month ago 9 5 1 1
Preview
MaGIC 2026 - Marche Workshop on Group Actions in Cryptography A workshop dedicated to the study of cryptographic group actions, a rapidly evolving area at the intersection of algebraic geometry, number theory, and post-quantum cryptography. The workshop will bri...

We're organizing a workshop on cryptographic group actions bringing together the isogeny and code communities. The workshop is just before Eurocrypt, a quick train away from Rome in the beautiful Marche.

Early registration ends this week, so grab your spot soon!

magic-workshop.github.io

1 month ago 6 5 0 0

I am very happy to announce that thanks to the hard work of many people (The "MIKE Team"), we now have a working implementation in SageMath of MIKE (Module Isogeny Key Exchange).

2 months ago 9 8 1 3

It depends if you interpret the waiting period to apply to the authors or to the paper :)

I think CiC and CHES have some form of this, but it doesn't automatically apply to all rejections: if the reviewers think the paper needs significantly more work, the authors cannot resubmit immediately

2 months ago 0 1 0 0

A waiting period may not be the best option, but we probably need some kind of pre-review check. Right now, it takes very little work for authors to resubmit the same paper again and again until it gets through, while it takes the 3+ reviewers a considerable amount of work to re-review the paper

2 months ago 0 0 0 0
Advertisement

The waiting period would be on resubmitting the same paper though, which may be helpful to prevent authors from spamming the same paper over and over again until they get lucky.

2 months ago 0 0 2 0
International Association for Cryptologic Research

The IACR board sent a survey to members last year, and it took us a while to analyze the results and publish findings. You can see them at iacr.org/surveyresults/

2 months ago 8 9 2 2

1. In the AIM, the Sigma protocol underlying SQIsign is sound without rewinding, which means we can show that SQIsign is provably secure in the QROM.

2. The CDH and DLOG problem for all SIDH-like key exchanges (M-SIDH, MD-SIDH, binSIDH, terSIDH, etc.) are equivalent in the AIM.

3 months ago 4 1 1 0

New paper out! 🎉

We translate the algebraic group model to the (generic) isogeny setting, generalising previous results that were limited to oriented isogenies (we show that any result that holds in the AGAM also holds in the AIM).

Using this model, we obtain two important results:

3 months ago 12 3 1 0

It also helps to announce those limits in advance, or communicate them clearly, or NOT delete rebuttals, or...

4 months ago 1 0 0 0

This makes more sense than it seems: the time change happens at the same time in both time zones, which means in the UK it’s at 1am rather than 2am.

5 months ago 2 0 1 0

The Isogeny Club Season 7 starts today! At 5pm CEST, Bruno Sterner will talk about finding large smooth twins from short lattice vectors. More details at isogeny.club

6 months ago 10 7 1 0
The Isogeny Problems

Announcing The Isogeny Problems!

A curated list of the seven foremost unsolved problems in isogeny-based cryptography. Solving one of these profound questions would mark a monumental advance, and as a resolver you'd get eternal honor and epic rewards!

Full list: isogeni.es/problems

7 months ago 16 6 1 0
Advertisement

The EU wants to spend your money to assemble a giant mass surveillance machine with little effect on harm against children. Chat Control is not effective, weakens security for all and does not respect privacy. Contact your EU representatives and let them know.

csa-scientist-open-letter.org/Sep2025

7 months ago 20 10 0 0

If you're a researcher in cryptography, security, or related areas, please consider signing it too. Signature collection is still open!

7 months ago 2 0 0 0

More than 500 researchers have signed an open letter against the dangerous EU proposal on chat control.

The proposal remains ineffective, undoes decades of results in E2E encryption, and threatens the privacy of half a billion citizens.

csa-scientist-open-letter.org/Sep2025

7 months ago 16 12 1 0
andrea basso

New somewhat redesigned, somewhat expanded website at andreabasso.com!

If you find any dead links or things not working properly, please let me know

7 months ago 1 0 0 0
Abstract. The Learning with Rounding (LWR) problem, introduced as a deterministic variant of Learning with Errors (LWE), has become a promising foundation for post-quantum cryptography. This Systematization of Knowledge (SoK) paper presents a comprehensive survey of the theoretical foundations, algorithmic developments, and practical implementations of LWR-based cryptographic schemes. We introduce LWR within the broader landscape of lattice-based cryptography and post-quantum security, highlighting its advantages such as reduced randomness, improved efficiency, and enhanced side-channel resistance. We explore the evolution of security reductions from LWR to LWE, including recent advances that support practical parameter regimes and address challenges in both bounded and unbounded sample settings. This paper systematically reviews existing LWR-based schemes — including Saber, Lizard, Florete, Espada, Sable, and SMAUG — analyzing their design choices, parameter sets, and performance trade-offs. Furthermore, we examine the impact of LWR on side-channel resistance, failure probabilities, and masking efficiency, demonstrating its suitability for secure and efficient implementations. By consolidating the research spanning theory and practice, this SoK aims to guide future cryptographic design and standardization efforts leveraging LWR.

Abstract. The Learning with Rounding (LWR) problem, introduced as a deterministic variant of Learning with Errors (LWE), has become a promising foundation for post-quantum cryptography. This Systematization of Knowledge (SoK) paper presents a comprehensive survey of the theoretical foundations, algorithmic developments, and practical implementations of LWR-based cryptographic schemes. We introduce LWR within the broader landscape of lattice-based cryptography and post-quantum security, highlighting its advantages such as reduced randomness, improved efficiency, and enhanced side-channel resistance. We explore the evolution of security reductions from LWR to LWE, including recent advances that support practical parameter regimes and address challenges in both bounded and unbounded sample settings. This paper systematically reviews existing LWR-based schemes — including Saber, Lizard, Florete, Espada, Sable, and SMAUG — analyzing their design choices, parameter sets, and performance trade-offs. Furthermore, we examine the impact of LWR on side-channel resistance, failure probabilities, and masking efficiency, demonstrating its suitability for secure and efficient implementations. By consolidating the research spanning theory and practice, this SoK aims to guide future cryptographic design and standardization efforts leveraging LWR.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms (Andrea Basso, Joppe W. Bos, Jan-Pieter D'Anvers, Angshuman Karmakar, Jose Maria Bermudo Mera, Joost Renes, Sujoy Sinha Roy, Frederik Vercauteren, Peng Wang, Yuewu Wang, Shicong Zhang, Chenxin Zhong) ia.cr/2025/1382

8 months ago 4 3 0 0
Preview
Commission presents Roadmap for effective and lawful access to data for law enforcement The European Commission presented today a Roadmap setting out the way forward to ensure law enforcement authorities in the EU have effective and lawful access to data.

Well, this horrible idea refuses to die so we should refuse to let it pass and start organizing again.

ec.europa.eu/commission/p...

9 months ago 75 42 2 5
Preview
Call for Stipends - ASCRYPTO '25

And for For PhD & advanced MSc students!
🌍 Stipends available for students worldwide — thanks to our sponsors!
đź“‹ Apply for stipends here: docs.google.com/forms/d/e/1F...
🖼️ Consider presenting your work in the Latincrypt poster session!
đź”— More info: ascrypto.org/2025/

9 months ago 2 2 0 0
A chart for quantum computers, of number of qubits versus error rate, on a logarithmic scale. Broadly it shows a large gap between current quantum computers in the bottom left, and a curve in the top right of the resources they need to break RSA.

A chart for quantum computers, of number of qubits versus error rate, on a logarithmic scale. Broadly it shows a large gap between current quantum computers in the bottom left, and a curve in the top right of the resources they need to break RSA.

An out-of-schedule update to my quantum landscape chart: sam-jaques.appspot.com/quantum_land..., prompted by
@craiggidney.bsky.social 's new paper: arxiv.org/abs/2505.15917.

A startling jump (20x) in how easy quantum factoring can be!

Also: much improved web design!

10 months ago 61 26 3 0

I’m afraid not :(

10 months ago 0 0 0 0
Advertisement

We (finally) published all the material from this course on SQIsign, including lecture slides and exercise sheets for the Sage laboratory. Available here: github.com/andreavico/S...

10 months ago 16 16 1 0

For any polynomial-time abbiatese A...

(abbiategrassese? abbiatese grasso?)

10 months ago 1 0 0 0

Every time I'm writing a paper I always have the same question: is the attacker a person? Is the attacker a they or a it?

10 months ago 2 0 1 0

Really cool post on DH!

10 months ago 1 0 0 0

Starting in half an hour!

11 months ago 2 1 0 0