


default search action
PQCrypto 2018: Fort Lauderdale, FL, USA
- Tanja Lange, Rainer Steinwandt:

Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lecture Notes in Computer Science 10786, Springer 2018, ISBN 978-3-319-79062-6
Code-Based Cryptography
- Marco Baldi

, Alessandro Barenghi
, Franco Chiaraluce
, Gerardo Pelosi
, Paolo Santini
:
LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes. 3-24 - Leif Both, Alexander May

:
Decoding Linear Codes with High Error Rate and Its Impact for LPN Security. 25-46 - Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier:

QC-MDPC: A Timing Attack and a CCA2 KEM. 47-76 - Wen Wang, Jakub Szefer, Ruben Niederhagen:

FPGA-Based Niederreiter Cryptosystem Using Binary Goppa Codes. 77-98
Cryptanalysis
- Koen de Boer, Léo Ducas, Stacey Jeffery

, Ronald de Wolf:
Attacks on the AJPS Mersenne-Based Cryptosystem. 101-120 - Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang

:
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs. 121-141 - Keita Xagawa

:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017. 142-161
Hash-Based Cryptography
- Laurent Castelnovi, Ange Martinelli, Thomas Prest

:
Grafting Trees: A Fault Attack Against the SPHINCS Framework. 165-184 - Jan Czajkowski

, Leon Groot Bruinderink, Andreas Hülsing
, Christian Schaffner
, Dominique Unruh
:
Post-quantum Security of the Sponge Construction. 185-204 - Stefan Kölbl:

Putting Wings on SPHINCS. 205-226
Isogenies in Cryptography
- Joost Renes:

Computing Isogenies Between Montgomery Curves Using the Action of (0, 0). 229-247 - Gustavo H. M. Zanon, Marcos A. Simplício Jr.

, Geovandro C. C. F. Pereira
, Javad Doliskani
, Paulo S. L. M. Barreto
:
Faster Isogeny-Based Compressed Key Agreement. 248-268
Lattice-Based Cryptography
- Pauline Bert, Pierre-Alain Fouque

, Adeline Roux-Langlois
, Mohamed Sabt:
Practical Implementation of Ring-SIS/LWE Based Signature and IBE. 271-291 - Thijs Laarhoven

, Artur Mariano:
Progressive Lattice Sieving. 292-311 - Hart Montgomery:

A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples. 312-330 - Shingo Sato

, Junji Shikata:
Lattice-Based Signcryption Without Random Oracles. 331-351
Multivariate Cryptography
- John Baena, Daniel Cabarcas, Daniel E. Escudero, Karan Khathuria

, Javier A. Verbel:
Rank Analysis of Cubic Multivariate Cryptosystems. 355-374 - Jintai Ding

, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. 375-395 - Yasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates:

HFERP - A New Multivariate Encryption Scheme. 396-416
Protocols
- David Derler

, Sebastian Ramacher
, Daniel Slamanig
:
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives. 419-440 - Rachid El Bansarkhani

, Rafael Misoczki:
G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions. 441-463
Quantum Algorithms
- Marko Balogh, Edward Eaton, Fang Song:

Quantum Collision-Finding in Non-uniform Random Functions. 467-486 - Daniel J. Bernstein, Bo-Yin Yang

:
Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations. 487-506 - Elena Kirshanova

:
Improved Quantum Information Set Decoding. 507-527

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














