


default search action
PQCrypto 2025: Taipei, Taiwan - Part II
- Ruben Niederhagen, Markku-Juhani O. Saarinen

:
Post-Quantum Cryptography - 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15578, Springer 2025, ISBN 978-3-031-86601-2
Isogeny-Based Cryptography
- Ryo Yoshizumi, Hiroshi Onuki

, Ryo Ohashi
, Momonari Kudo, Koji Nuida:
Efficient Theta-Based Algorithms for Computing (ℓ , ℓ )-Isogenies on Kummer Surfaces for Arbitrary Odd ℓ. 3-37 - Youcef Mokrani, David Jao

:
Commuting Ramanujan Graphs and the Random Self-reducibility of Isogeny Problems. 38-60
Cryptanalysis
- Amaury Pouly

, Yixin Shen
:
Discrete Gaussian Sampling for BKZ-Reduced Basis. 63-88 - Ryo Ohashi

, Hiroshi Onuki
:
An Efficient Collision Attack on Castryck-Decru-Smith's Hash Function. 89-118 - Geng Wang, Wenwen Xia, Dawu Gu:

Heuristic Algorithm for Solving Restricted SVP and Its Applications. 119-152 - Henry Bambury, Phong Q. Nguyen:

Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms. 153-175 - Alex Pellegrini, Marc Vorstermans:

Analysis of REDOG: The Pad Thai Attack. 176-192
Quantum Security
- Mengyuan Zhang, Wenling Wu, Han Sui:

Quantum IND-CPA Security Notions for AEAD. 195-230 - Barbara Jiabao Benedikt:

Reducing the Number of Qubits in Solving LWE. 231-263
Side-Channel Attacks
- Julie Godard, Nicolas Aragon, Philippe Gaborit, Antoine Loiseau, Julien Maillard:

Single Trace Side-Channel Attack on the MPC-in-the-Head Framework. 267-293 - Thales B. Paiva

, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Sayan Das, Anupam Chattopadhyay:
Et tu, Brute? Side-Channel Assisted Chosen Ciphertext Attacks Using Valid Ciphertexts on HQC KEM. 294-321
Security Notions
- Kathrin Hövelmanns, Mikhail A. Kudinov

:
Treating Dishonest Ciphertexts in Post-quantum KEMs - Explicit vs. Implicit Rejection in the FO Transform. 325-350 - Bhuvnesh Chaturvedi

, Anirban Chakraborty
, Nimish Mishra
, Ayantika Chatterjee
, Debdeep Mukhopadhyay
:
IND-CPAbf C: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption. 351-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














