


default search action
PQCrypto 2024: College Park, MD, USA - Part II
- Markku-Juhani O. Saarinen

, Daniel Smith-Tone:
Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14772, Springer 2024, ISBN 978-3-031-62745-3
Isogeny-Based Cryptography
- Tomoki Moriya

, Hiroshi Onuki
, Maozhi Xu, Guoqing Zhou:
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation. 3-19 - Antonin Leroux, Maxime Roméas:

Updatable Encryption from Group Actions. 20-53 - JeongHwan Lee

, Donghoe Heo
, Hyeonhak Kim
, GyuSang Kim
, Suhri Kim
, Heeseok Kim
, Seokhie Hong
:
Fault Attack on SQIsign. 54-76
Multivariate Cryptography
- Peigen Li

, Jintai Ding
:
Cryptanalysis of the SNOVA Signature Scheme. 79-91 - Pierre Pébereau:

One Vector to Rule Them All: Key Recovery from One Vector in UOV Schemes. 92-108 - Hiroki Furue, Momonari Kudo:

Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings. 109-143 - Benoît Cogliati, Gilles Macario-Rat, Jacques Patarin, Pierre Varjabedian:

State of the Art of HFE Variants - Is It Possible to Repair HFE with Appropriate Modifiers? 144-167 - Thomas Aulbach, Simona Samardjiska, Monika Trimoska:

Practical Key-Recovery Attack on MQ-Sign and More. 168-185 - Hao Guo

, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding
:
Practical and Theoretical Cryptanalysis of VOX. 186-208
Quantum Algorithms
- Martin Ekerå

, Joel Gärtner
:
Extending Regev's Factoring Algorithm to Compute Discrete Logarithms. 211-242
Transforms and Proofs
- Kathrin Hövelmanns, Christian Majenz

:
A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness. 245-265 - Kamil Doruk Gür

, Jonathan Katz
, Tjerand Silde
:
Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption. 266-300 - Thomas Aulbach, Samed Düzlü, Michael Meyer

, Patrick Struck, Maximiliane Weishäupl:
Hash Your Keys Before Signing - BUFF Security of the Additional NIST PQC Signatures. 301-335 - Yao Cheng, Xianhui Lu, Ziyi Li

, Bao Li:
Revisiting Anonymity in Post-quantum Public Key Encryption. 336-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














