default search action
PQCrypto 2019: Chongqing, China
- Jintai Ding, Rainer Steinwandt:
Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11505, Springer 2019, ISBN 978-3-030-25509-1
Lattice-Based Cryptography
- Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger:
Finding Closest Lattice Vectors Using Approximate Voronoi Cells. 3-22 - Farnoud Farahmand, Viet Ba Dang, Duc Tri Nguyen, Kris Gaj:
Evaluating the Potential for Hardware Acceleration of Four NTRU-Based Key Encapsulation Mechanisms Using Software/Hardware Codesign. 23-43 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Forward-Secure Group Signatures from Lattices. 44-64 - Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu:
Towards Practical Microcontroller Implementation of the Signature Scheme Falcon. 65-80
Learning with Errors
- Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-quantum Public-Key Encryption. 83-102 - Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede:
The Impact of Error Dependencies on Ring/Mod-LWE/LWR Based Schemes. 103-115 - Xavier Boyen, Qinyi Li:
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE. 116-130
Cryptanalysis
- Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich:
Recovering Short Secret Keys of RLCE in Polynomial Time. 133-152 - Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15. 153-166 - Javier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone:
On the Complexity of "Superdetermined" Minrank Instances. 167-186
Key Establishment
- Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz:
Constant-Round Group Key Exchange from the Ring-LWE Assumption. 189-205 - Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. 206-226 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model. 227-248 - Keita Xagawa, Takashi Yamakawa:
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model. 249-268
Isogeny-Based Cryptography
- Thomas Decru, Lorenz Panny, Frederik Vercauteren:
Faster SeaSign Signatures Through Improved Rejection Sampling. 271-285 - E. Victor Flynn, Yan Bo Ti:
Genus Two Isogeny Cryptography. 286-306 - Michael Meyer, Fabio Campos, Steffen Reith:
On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH. 307-325
Hash-Based Cryptography
- Ben Hamlin, Fang Song:
Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing. 329-349 - Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Improved Quantum Multicollision-Finding Algorithm. 350-367
Code-Based Cryptography
- Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, Etienne Marcatel:
Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes. 371-386 - Pedro Branco, Paulo Mateus:
A Traceable Ring Signature Scheme Based on Coding Theory. 387-403 - Nicolas Sendrier, Valentin Vasseur:
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders. 404-416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.