default search action
PQCrypto 2024: College Park, MD, USA - Part II
- Markku-Juhani O. Saarinen, Daniel Smith-Tone:
Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14772, Springer 2024, ISBN 978-3-031-62745-3
Isogeny-Based Cryptography
- Tomoki Moriya, Hiroshi Onuki, Maozhi Xu, Guoqing Zhou:
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation. 3-19 - Antonin Leroux, Maxime Roméas:
Updatable Encryption from Group Actions. 20-53 - JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, GyuSang Kim, Suhri Kim, Heeseok Kim, Seokhie Hong:
Fault Attack on SQIsign. 54-76
Multivariate Cryptography
- Peigen Li, Jintai Ding:
Cryptanalysis of the SNOVA Signature Scheme. 79-91 - Pierre Pébereau:
One Vector to Rule Them All: Key Recovery from One Vector in UOV Schemes. 92-108 - Hiroki Furue, Momonari Kudo:
Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings. 109-143 - Benoît Cogliati, Gilles Macario-Rat, Jacques Patarin, Pierre Varjabedian:
State of the Art of HFE Variants - Is It Possible to Repair HFE with Appropriate Modifiers? 144-167 - Thomas Aulbach, Simona Samardjiska, Monika Trimoska:
Practical Key-Recovery Attack on MQ-Sign and More. 168-185 - Hao Guo, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding:
Practical and Theoretical Cryptanalysis of VOX. 186-208
Quantum Algorithms
- Martin Ekerå, Joel Gärtner:
Extending Regev's Factoring Algorithm to Compute Discrete Logarithms. 211-242
Transforms and Proofs
- Kathrin Hövelmanns, Christian Majenz:
A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness. 245-265 - Kamil Doruk Gür, Jonathan Katz, Tjerand Silde:
Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption. 266-300 - Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl:
Hash Your Keys Before Signing - BUFF Security of the Additional NIST PQC Signatures. 301-335 - Yao Cheng, Xianhui Lu, Ziyi Li, Bao Li:
Revisiting Anonymity in Post-quantum Public Key Encryption. 336-370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.