default search action
PQCrypto 2021: Daejeon, South Korea
- Jung Hee Cheon, Jean-Pierre Tillich:
Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings. Lecture Notes in Computer Science 12841, Springer 2021, ISBN 978-3-030-81292-8
Code-Based Cryptography
- Maxime Bombar, Alain Couvreur:
Decoding Supercodes of Gabidulin Codes and Applications to Cryptanalysis. 3-22 - Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem. 23-43 - André Chailloux, Thomas Debris-Alazard, Simona Etinski:
Classical and Quantum Algorithms for Generic Syndrome Decoding Problems and Applications to the Lee Metric. 44-62
Multivariate Cryptography
- Hiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi:
Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem. 65-78 - Daniel Smith-Tone:
New Practical Multivariate Signatures from a Nonlinear Modifier. 79-97 - Morten Øygarden, Daniel Smith-Tone, Javier A. Verbel:
On the Effect of Projection on Rank Attacks in Multivariate Cryptography. 98-113
Quantum Algorithms
- Iggy van Hoof, Elena Kirshanova, Alexander May:
Quantum Key Search for Ternary LWE. 117-132 - Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens:
A Fusion Algorithm for Solving the Hidden Shift Problem in Finite Abelian Groups. 133-153 - Edward Eaton, Douglas Stebila:
The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols. 154-173
Implementation and Side Channel Attack
- Tim Gellersen, Okan Seker, Thomas Eisenbarth:
Differential Power Analysis of the Picnic Signature Scheme. 177-194 - Pauline Bert, Gautier Eberhart, Lucas Prabel, Adeline Roux-Langlois, Mohamed Sabt:
Implementation of Lattice Trapdoors on Modules and Applications. 195-214 - Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. 215-233 - Duc Tri Nguyen, Kris Gaj:
Fast NEON-Based Multiplication for Lattice-Based NIST Post-quantum Cryptography Finalists. 234-254
Isogeny
- Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren:
CSI-RAShi: Distributed Key Generation for CSIDH. 257-276 - Tako Boris Fouotsa, Christophe Petit:
SimS: A Simplification of SiGamal. 277-295 - Aaron Hutchinson, Koray Karabina, Geovandro Pereira:
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE. 296-315
Lattice-Based Cryptography
- Tamar Lichter Blanks, Stephen D. Miller:
Generating Cryptographically-Strong Random Lattice Bases and Recognizing Rotations of $\mathbb {Z}^n$. 319-338 - San Ling, Khoa Nguyen, Duong Hieu Phan, Hanh Tang, Huaxiong Wang:
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. 339-359 - Jiaxin Pan, Benedikt Wagner:
Short Identity-Based Signatures with Tight Security from Lattices. 360-379 - Rouzbeh Behnia, Yilei Chen, Daniel Masny:
On Removing Rejection Conditions in Practical Lattice-Based Signatures. 380-398 - Xavier Boyen, Malika Izabachène, Qinyi Li:
Secure Hybrid Encryption in the Standard Model from Hard Learning Problems. 399-418
Cryptanalysis
- Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting. 421-441 - Magali Bardet, Pierre Briaud:
An Algebraic Approach to the Rank Support Learning Problem. 442-462 - Tommaso Gagliardoni, Juliane Krämer, Patrick Struck:
Quantum Indistinguishability for Public Key Encryption. 463-482 - Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. 483-498
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.