


default search action
PQCrypto 2023: College Park, MD, USA
- Thomas Johansson, Daniel Smith-Tone:

Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings. Lecture Notes in Computer Science 14154, Springer 2023, ISBN 978-3-031-40002-5
Code-Based Cryptography
- Alain Couvreur, Ilaria Zappatore:

An Extension of Overbeck's Attack with an Application to Cryptanalysis of Twisted Gabidulin-Based Schemes. 3-37 - Pierre Briaud, Pierre Loidreau:

Cryptanalysis of Rank-Metric Schemes Based on Distorted Gabidulin Codes. 38-56 - Luke Beckwith, Robert Wallace, Kamyar Mohajerani, Kris Gaj:

A High-Performance Hardware Implementation of the LESS Digital Signature Scheme. 57-90 - Nicolas Sendrier:

Wave Parameter Selection. 91-110
Group-Action-Based Cryptography
- Christopher Battarbee, Delaram Kahrobaei

, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures. 113-138
Isogeny-Based Cryptography
- Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata:

A Tightly Secure Identity-Based Signature Scheme from Isogenies. 141-163
Lattice-Based Cryptography
- Elena Kirshanova

, Alexander May
, Julian Nowakowski
:
New NTRU Records with Improved Lattice Bases. 167-195 - Karim Eldefrawy, Nicholas Genise, Nathan Manohar:

On the Hardness of Scheme-Switching Between SIMD FHE Schemes. 196-224 - André Chailloux, Johanna Loyer:

Classical and Quantum 3 and 4-Sieves to Solve SVP with Low Memory. 225-255 - Cong Ling, Andrew Mendelsohn

:
NTRU in Quaternion Algebras of Bounded Discriminant. 256-290 - Qian Guo, Erik Mårtensson

:
Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber. 291-320 - Joel Gärtner:

NTWE: A Natural Combination of NTRU and LWE. 321-353
Multivariate Cryptography
- Hiroki Furue, Tsuyoshi Takagi:

Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. 357-378 - Ignacio Luengo, Martin E. Avendano, Pilar Coscojuela:

DME: A Full Encryption, Signature and KEM Multivariate Public Key Cryptosystem. 379-402
Quantum Algorithms, Cryptanalysis and Models
- Serge Fehr, Yu-Hsuan Huang:

On the Quantum Security of HAWK. 405-416 - Navid Alamati, Varun Maram

, Daniel Masny:
Non-Observable Quantum Random Oracle Model. 417-444 - Tristan Nemoz, Zoé Amblard, Aurélien Dupin:

Characterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of Operation. 445-475 - Vincent Quentin Ulitzsch, Jean-Pierre Seifert:

Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications' Cryptographic Backbone. 476-504 - Maxime Remaud

, André Schrottenloher, Jean-Pierre Tillich:
Time and Query Complexity Tradeoffs for the Dihedral Coset Problem. 505-532
Post-Quantum Protocols
- Jason Goertzen, Douglas Stebila

:
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation. 535-564 - Liqun Chen

, Changyu Dong
, Nada El Kassem
, Christopher J. P. Newton
, Yalan Wang
:
Hash-Based Direct Anonymous Attestation. 565-600 - Sonja Bruckner, Sebastian Ramacher

, Christoph Striecks
:
Muckle+: End-to-End Hybrid Authenticated Key Exchanges. 601-633
Side-Channel Cryptanalysis and Countermeasures
- Markku-Juhani O. Saarinen

:
WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography. 637-657 - Alexander Wagner

, Vera Wesselkamp
, Felix Oberhansl
, Marc Schink, Emanuele Strieder
:
Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or SPHINCS+ Signatures. 658-687 - Hauke Malte Steffen

, Georg Land
, Lucie Johanna Kogelheide
, Tim Güneysu
:
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware. 688-711

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














