


default search action
PQCrypto 2016: Fukuoka, Japan
- Tsuyoshi Takagi:
Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings. Lecture Notes in Computer Science 9606, Springer 2016, ISBN 978-3-319-29359-2 - Ingo von Maurich, Lukas Heberle, Tim Güneysu
:
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. 1-17 - Philippe Gaborit, Adrien Hauteville, Jean-Pierre Tillich:
RankSynd a PRNG Based on Rank Metric. 18-28 - Markus Grassl
, Brandon Langenberg, Martin Roetteler
, Rainer Steinwandt:
Applying Grover's Algorithm to AES: Quantum Resource Estimates. 29-43 - Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi
, Gelo Noel Tabia
, Dominique Unruh:
Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation. 44-63 - Vladimir Soukharev, David Jao
, Srinath Seshadri
:
Post-Quantum Security Models for Authenticated Encryption. 64-78 - Ehsan Ebrahimi Targhi, Gelo Noel Tabia
, Dominique Unruh:
Quantum Collision-Resistance of Non-uniformly Distributed Functions. 79-85 - Aurélie Phesso, Jean-Pierre Tillich:
An Efficient Attack on a Code-Based Signature Scheme. 86-103 - Dustin Moody
, Ray A. Perlner:
Vulnerabilities of "McEliece in the World of Escher". 104-117 - Magali Bardet, Julia Chaulet, Vlad Dragoi
, Ayoub Otmani
, Jean-Pierre Tillich:
Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes. 118-143 - Rodolfo Canto Torres, Nicolas Sendrier:
Analysis of Information Set Decoding for a Sub-linear Error Weight. 144-161 - Ryann Cartor, Ryan Gipson, Daniel Smith-Tone, Jeremy Vates:
On the Differential Security of the HFEv- Signature Primitive. 162-181 - Alan Szepieniec, Jintai Ding, Bart Preneel
:
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems. 182-196 - Ray A. Perlner, Daniel Smith-Tone:
Security Analysis and Key Modification for ZHFE. 197-212 - John B. Baena
, Daniel Cabarcas, Daniel E. Escudero, Jaiberth Porras-Barrera, Javier A. Verbel:
Efficient ZHFE Key Generation. 213-232 - Oscar Reparaz, Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren
, Ingrid Verbauwhede
:
Additively Homomorphic Ring-LWE Masking. 233-244 - Ilaria Chillotti
, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
A Homomorphic LWE Based E-voting Scheme. 245-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.