


default search action
PQCrypto 2024: Oxford, UK - Part I
- Markku-Juhani O. Saarinen, Daniel Smith-Tone:
Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14771, Springer 2024, ISBN 978-3-031-62742-2
Applications and Protocols
- Loïc Ferreira
, Johan Pascal:
Post-quantum Secure ZRTP. 3-36 - Liqun Chen
, Changyu Dong
, Nada El Kassem
, Christopher J. P. Newton
, Yalan Wang
:
A New Hash-Based Enhanced Privacy ID Signature Scheme. 37-71
Code-Based Cryptography
- Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit, Adrien Vinçotte:
The Blockwise Rank Syndrome Learning Problem and Its Applications to Cryptography. 75-106 - Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-Code-Based Signature Schemes. 107-134
Group-Action-Based Cryptography
- Jonas Meers
, Doreen Riepel
:
CCA Secure Updatable Encryption from Non-mappable Group Actions. 137-169 - Benjamin Bencina, Alessandro Budroni, Jesús-Javier Chi-Domínguez, Mukul Kulkarni:
Properties of Lattice Isomorphism as a Cryptographic Group Action. 170-201 - Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. 202-226 - Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Tuong Ngoc Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo
, Gang Tang:
On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures. 227-261
Lattice-Based Cryptography
- Corentin Jeudy
, Adeline Roux-Langlois
, Olivier Sanders
:
Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets. 265-299 - Toi Tomita
, Junji Shikata:
Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWE. 300-321 - Zhen Liu, Vishakha, Jintai Ding, Chi Cheng, Yanbin Pan:
An Improved Practical Key Mismatch Attack Against NTRU. 322-342 - Henry Bambury, Phong Q. Nguyen:
Improved Provable Reduction of NTRU and Hypercubic Lattices. 343-370 - Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, Jinwei Zheng:
Compact Encryption Based on Module-NTRU Problems. 371-405 - Leizhang Wang
:
Analyzing Pump and Jump BKZ Algorithm Using Dynamical Systems. 406-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.