default search action
PQCrypto 2018: Fort Lauderdale, FL, USA
- Tanja Lange, Rainer Steinwandt:
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lecture Notes in Computer Science 10786, Springer 2018, ISBN 978-3-319-79062-6
Code-Based Cryptography
- Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes. 3-24 - Leif Both, Alexander May:
Decoding Linear Codes with High Error Rate and Its Impact for LPN Security. 25-46 - Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier:
QC-MDPC: A Timing Attack and a CCA2 KEM. 47-76 - Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-Based Niederreiter Cryptosystem Using Binary Goppa Codes. 77-98
Cryptanalysis
- Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf:
Attacks on the AJPS Mersenne-Based Cryptosystem. 101-120 - Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang:
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs. 121-141 - Keita Xagawa:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017. 142-161
Hash-Based Cryptography
- Laurent Castelnovi, Ange Martinelli, Thomas Prest:
Grafting Trees: A Fault Attack Against the SPHINCS Framework. 165-184 - Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh:
Post-quantum Security of the Sponge Construction. 185-204 - Stefan Kölbl:
Putting Wings on SPHINCS. 205-226
Isogenies in Cryptography
- Joost Renes:
Computing Isogenies Between Montgomery Curves Using the Action of (0, 0). 229-247 - Gustavo H. M. Zanon, Marcos A. Simplício Jr., Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto:
Faster Isogeny-Based Compressed Key Agreement. 248-268
Lattice-Based Cryptography
- Pauline Bert, Pierre-Alain Fouque, Adeline Roux-Langlois, Mohamed Sabt:
Practical Implementation of Ring-SIS/LWE Based Signature and IBE. 271-291 - Thijs Laarhoven, Artur Mariano:
Progressive Lattice Sieving. 292-311 - Hart Montgomery:
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples. 312-330 - Shingo Sato, Junji Shikata:
Lattice-Based Signcryption Without Random Oracles. 331-351
Multivariate Cryptography
- John Baena, Daniel Cabarcas, Daniel E. Escudero, Karan Khathuria, Javier A. Verbel:
Rank Analysis of Cubic Multivariate Cryptosystems. 355-374 - Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. 375-395 - Yasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates:
HFERP - A New Multivariate Encryption Scheme. 396-416
Protocols
- David Derler, Sebastian Ramacher, Daniel Slamanig:
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives. 419-440 - Rachid El Bansarkhani, Rafael Misoczki:
G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions. 441-463
Quantum Algorithms
- Marko Balogh, Edward Eaton, Fang Song:
Quantum Collision-Finding in Non-uniform Random Functions. 467-486 - Daniel J. Bernstein, Bo-Yin Yang:
Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations. 487-506 - Elena Kirshanova:
Improved Quantum Information Set Decoding. 507-527
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.