


default search action
PQCrypto 2021: Daejeon, South Korea
- Jung Hee Cheon

, Jean-Pierre Tillich
:
Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings. Lecture Notes in Computer Science 12841, Springer 2021, ISBN 978-3-030-81292-8
Code-Based Cryptography
- Maxime Bombar

, Alain Couvreur:
Decoding Supercodes of Gabidulin Codes and Applications to Cryptanalysis. 3-22 - Alessandro Barenghi

, Jean-François Biasse, Edoardo Persichetti
, Paolo Santini
:
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem. 23-43 - André Chailloux, Thomas Debris-Alazard, Simona Etinski:

Classical and Quantum Algorithms for Generic Syndrome Decoding Problems and Applications to the Lee Metric. 44-62
Multivariate Cryptography
- Hiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi:

Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem. 65-78 - Daniel Smith-Tone:

New Practical Multivariate Signatures from a Nonlinear Modifier. 79-97 - Morten Øygarden, Daniel Smith-Tone, Javier A. Verbel:

On the Effect of Projection on Rank Attacks in Multivariate Cryptography. 98-113
Quantum Algorithms
- Iggy van Hoof, Elena Kirshanova

, Alexander May
:
Quantum Key Search for Ternary LWE. 117-132 - Wouter Castryck

, Ann Dooms
, Carlo Emerencia
, Alexander Lemmens:
A Fusion Algorithm for Solving the Hidden Shift Problem in Finite Abelian Groups. 133-153 - Edward Eaton, Douglas Stebila

:
The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols. 154-173
Implementation and Side Channel Attack
- Tim Gellersen, Okan Seker, Thomas Eisenbarth

:
Differential Power Analysis of the Picnic Signature Scheme. 177-194 - Pauline Bert, Gautier Eberhart, Lucas Prabel, Adeline Roux-Langlois

, Mohamed Sabt:
Implementation of Lattice Trapdoors on Modules and Applications. 195-214 - Ruben Gonzalez, Andreas Hülsing

, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger
, Elisabeth Waitz, Thom Wiggers
, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. 215-233 - Duc Tri Nguyen, Kris Gaj:

Fast NEON-Based Multiplication for Lattice-Based NIST Post-quantum Cryptography Finalists. 234-254
Isogeny
- Ward Beullens, Lucas Disson, Robi Pedersen

, Frederik Vercauteren:
CSI-RAShi: Distributed Key Generation for CSIDH. 257-276 - Tako Boris Fouotsa

, Christophe Petit
:
SimS: A Simplification of SiGamal. 277-295 - Aaron Hutchinson, Koray Karabina, Geovandro Pereira:

Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE. 296-315
Lattice-Based Cryptography
- Tamar Lichter Blanks, Stephen D. Miller

:
Generating Cryptographically-Strong Random Lattice Bases and Recognizing Rotations of $\mathbb {Z}^n$. 319-338 - San Ling

, Khoa Nguyen
, Duong Hieu Phan
, Hanh Tang
, Huaxiong Wang:
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. 339-359 - Jiaxin Pan

, Benedikt Wagner
:
Short Identity-Based Signatures with Tight Security from Lattices. 360-379 - Rouzbeh Behnia, Yilei Chen, Daniel Masny:

On Removing Rejection Conditions in Practical Lattice-Based Signatures. 380-398 - Xavier Boyen, Malika Izabachène, Qinyi Li:

Secure Hybrid Encryption in the Standard Model from Hard Learning Problems. 399-418
Cryptanalysis
- Tingting Guo

, Peng Wang
, Lei Hu, Dingfeng Ye:
Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting. 421-441 - Magali Bardet, Pierre Briaud:

An Algebraic Approach to the Rank Support Learning Problem. 442-462 - Tommaso Gagliardoni, Juliane Krämer, Patrick Struck

:
Quantum Indistinguishability for Public Key Encryption. 463-482 - Prastudy Fauzi

, Martha Norberg Hovd, Håvard Raddum:
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. 483-498

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














