


default search action
PQCrypto 2017: Utrecht, The Netherlands
- Tanja Lange, Tsuyoshi Takagi:

Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lecture Notes in Computer Science 10346, Springer 2017, ISBN 978-3-319-59878-9
Code-Based Cryptography
- Pierre Loidreau:

A New Rank Metric Codes Based Encryption Scheme. 3-17 - Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor

:
Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory. 18-34 - Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka:

CCA2 Key-Privacy for Code-Based Encryption in the Standard Model. 35-50 - Tomás Fabsic

, Viliam Hromada
, Paul Stankovski, Pavol Zajac
, Qian Guo
, Thomas Johansson
:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. 51-68 - Ghazal Kachigar, Jean-Pierre Tillich:

Quantum Information Set Decoding Algorithms. 69-89
Isogeny-Based Cryptography
- Alexandre Gélin, Benjamin Wesolowski:

Loop-Abort Faults on Supersingular Isogeny Cryptosystems. 93-106 - Yan Bo Ti

:
Fault Attack on Supersingular Isogeny Cryptosystems. 107-122
Lattice-Based Cryptography
- Charles Bouillaguet

, Claire Delaplace, Pierre-Alain Fouque
, Paul Kirchner
:
Fast Lattice-Based Encryption: Stretching Spring. 125-142 - Erdem Alkim

, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega:
Revisiting TESLA in the Quantum Random Oracle Model. 143-162 - Boru Gong, Yunlei Zhao:

Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange. 163-183 - Florian Göpfert, Christine van Vredendaal, Thomas Wunderer:

A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE. 184-202
Multivariate Cryptography
- Albrecht Petzoldt, Ming-Shing Chen, Jintai Ding

, Bo-Yin Yang:
HMFEv - An Efficient Multivariate Signature Scheme. 205-223 - Alan Szepieniec, Ward Beullens, Bart Preneel

:
MQ Signatures for PKI. 224-240 - Ryann Cartor

, Daniel Smith-Tone:
An Updated Security Analysis of PFLASH. 241-254 - Dustin Moody

, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. 255-271 - Jeremy Vates, Daniel Smith-Tone:

Key Recovery Attack for All Parameters of HFE-. 272-288 - Daniel Cabarcas, Daniel Smith-Tone, Javier A. Verbel:

Key Recovery Attack for ZHFE. 289-308
Quantum Algorithms
- Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta:

Post-quantum RSA. 311-329 - Daniel J. Bernstein, Jean-François Biasse

, Michele Mosca:
A Low-Resource Quantum Factoring Algorithm. 330-346 - Martin Ekerå

, Johan Håstad:
Quantum Algorithms for Computing Short Discrete Logarithms and Factoring RSA Integers. 347-363
Security Models
- Bart Mennink, Alan Szepieniec:

XOR of PRPs in a Quantum World. 367-383 - Nina Bindel

, Udyani Herath, Matthew McKague
, Douglas Stebila
:
Transitioning to a Quantum-Resistant Public Key Infrastructure. 384-405 - Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser:

ORAMs in a Quantum World. 406-425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














