default search action
PQCrypto 2013: Limoges, France
- Philippe Gaborit:
Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings. Lecture Notes in Computer Science 7932, Springer 2013, ISBN 978-3-642-38615-2 - Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures. 1-15 - Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer:
Quantum Algorithms for the Subset-Sum Problem. 16-33 - Slim Bettaieb, Julien Schrek:
Improved Lattice-Based Threshold Ring Signature Scheme. 34-51 - Jintai Ding, Bo-Yin Yang:
Degree of Regularity for HFEv and HFEv-. 52-66 - Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe:
Software Speed Records for Lattice-Based Signatures. 67-82 - Thijs Laarhoven, Michele Mosca, Joop van de Pol:
Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search. 83-101 - Grégory Landais, Jean-Pierre Tillich:
An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes. 102-117 - Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi:
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations. 118-135 - Michele Mosca, Douglas Stebila, Berkant Ustaoglu:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. 136-154 - Xuyun Nie, Zhaohu Xu, Johannes Buchmann:
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme. 155-164 - Ray A. Perlner, Daniel Smith-Tone:
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems. 165-173 - Edoardo Persichetti:
Secure and Anonymous Hybrid Encryption from Coding Theory. 174-187 - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann:
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes. 188-202 - Nicolas Sendrier, Dimitris E. Simos:
The Hardness of Code Equivalence over and Its Application to Code-Based Cryptography. 203-216 - Falko Strenzke:
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems. 217-230 - Chengdong Tao, Adama Diene, Shaohua Tang, Jintai Ding:
Simple Matrix Scheme for Encryption. 231-242 - Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Multivariate Signature Scheme Using Quadratic Forms. 243-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.