default search action
PQCrypto 2011: Taipei, Taiwan
- Bo-Yin Yang:
Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings. Lecture Notes in Computer Science 7071, Springer 2011, ISBN 978-3-642-25404-8 - Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai:
General Fault Attacks on Multivariate Public Key Cryptosystems. 1-18 - David Jao, Luca De Feo:
Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. 19-34 - Philippe Gaborit, Julien Schrek, Gilles Zémor:
Full Cryptanalysis of the Chen Identification Protocol. 35-50 - Nicolas Sendrier:
Decoding One Out of Many. 51-67 - Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari:
On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack. 68-82 - Enrico Thomae, Christopher Wolf:
Roots of Square: Cryptanalysis of Double-Layer Square and Square+. 83-97 - Ayoub Otmani, Jean-Pierre Tillich:
An Efficient Attack on All Concrete KKS Proposals. 98-116 - Johannes Buchmann, Erik Dahmen, Andreas Hülsing:
XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions. 117-129 - Daniel Smith-Tone:
On the Differential Security of Multivariate Public Key Cryptosystems. 130-142 - Stefan Heyse:
Implementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded Devices. 143-162 - Xiang Xie, Rui Xue, Rui Zhang:
Efficient Threshold Encryption from Lossy Trapdoor Functions. 163-178 - Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki:
Monoidic Codes in Cryptography. 179-199 - Daniel J. Bernstein:
Simplified High-Speed High-Distance List Decoding for Alternant Codes. 200-216 - Robert Niebuhr:
Statistical Decoding of Codes over $\mathbb{F}_q$. 217-227 - Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen:
High-Speed Hardware Implementation of Rainbow Signature on FPGAs. 228-243 - Daniel J. Bernstein, Tanja Lange, Christiane Peters:
Wild McEliece Incognito. 244-254 - Lawrence M. Ioannou, Michele Mosca:
A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys. 255-274 - Takanori Yasuda, Kouichi Sakurai:
A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm. 275-294
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.