![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
PQCrypto 2017: Utrecht, The Netherlands
- Tanja Lange, Tsuyoshi Takagi:
Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lecture Notes in Computer Science 10346, Springer 2017, ISBN 978-3-319-59878-9
Code-Based Cryptography
- Pierre Loidreau:
A New Rank Metric Codes Based Encryption Scheme. 3-17 - Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor
:
Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory. 18-34 - Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka:
CCA2 Key-Privacy for Code-Based Encryption in the Standard Model. 35-50 - Tomás Fabsic
, Viliam Hromada
, Paul Stankovski, Pavol Zajac
, Qian Guo
, Thomas Johansson
:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. 51-68 - Ghazal Kachigar, Jean-Pierre Tillich:
Quantum Information Set Decoding Algorithms. 69-89
Isogeny-Based Cryptography
- Alexandre Gélin, Benjamin Wesolowski:
Loop-Abort Faults on Supersingular Isogeny Cryptosystems. 93-106 - Yan Bo Ti
:
Fault Attack on Supersingular Isogeny Cryptosystems. 107-122
Lattice-Based Cryptography
- Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque
, Paul Kirchner:
Fast Lattice-Based Encryption: Stretching Spring. 125-142 - Erdem Alkim
, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega:
Revisiting TESLA in the Quantum Random Oracle Model. 143-162 - Boru Gong, Yunlei Zhao:
Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange. 163-183 - Florian Göpfert, Christine van Vredendaal, Thomas Wunderer:
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE. 184-202
Multivariate Cryptography
- Albrecht Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang:
HMFEv - An Efficient Multivariate Signature Scheme. 205-223 - Alan Szepieniec, Ward Beullens, Bart Preneel
:
MQ Signatures for PKI. 224-240 - Ryann Cartor, Daniel Smith-Tone:
An Updated Security Analysis of PFLASH. 241-254 - Dustin Moody
, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. 255-271 - Jeremy Vates, Daniel Smith-Tone:
Key Recovery Attack for All Parameters of HFE-. 272-288 - Daniel Cabarcas, Daniel Smith-Tone, Javier A. Verbel:
Key Recovery Attack for ZHFE. 289-308
Quantum Algorithms
- Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta:
Post-quantum RSA. 311-329 - Daniel J. Bernstein, Jean-François Biasse
, Michele Mosca:
A Low-Resource Quantum Factoring Algorithm. 330-346 - Martin Ekerå
, Johan Håstad:
Quantum Algorithms for Computing Short Discrete Logarithms and Factoring RSA Integers. 347-363
Security Models
- Bart Mennink, Alan Szepieniec:
XOR of PRPs in a Quantum World. 367-383 - Nina Bindel
, Udyani Herath, Matthew McKague
, Douglas Stebila
:
Transitioning to a Quantum-Resistant Public Key Infrastructure. 384-405 - Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser:
ORAMs in a Quantum World. 406-425
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.