


default search action
PQCrypto 2021: Daejeon, South Korea
- Jung Hee Cheon
, Jean-Pierre Tillich
:
Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings. Lecture Notes in Computer Science 12841, Springer 2021, ISBN 978-3-030-81292-8
Code-Based Cryptography
- Maxime Bombar
, Alain Couvreur:
Decoding Supercodes of Gabidulin Codes and Applications to Cryptanalysis. 3-22 - Alessandro Barenghi
, Jean-François Biasse, Edoardo Persichetti
, Paolo Santini
:
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem. 23-43 - André Chailloux, Thomas Debris-Alazard, Simona Etinski:
Classical and Quantum Algorithms for Generic Syndrome Decoding Problems and Applications to the Lee Metric. 44-62
Multivariate Cryptography
- Hiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi:
Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem. 65-78 - Daniel Smith-Tone:
New Practical Multivariate Signatures from a Nonlinear Modifier. 79-97 - Morten Øygarden, Daniel Smith-Tone, Javier A. Verbel:
On the Effect of Projection on Rank Attacks in Multivariate Cryptography. 98-113
Quantum Algorithms
- Iggy van Hoof, Elena Kirshanova
, Alexander May
:
Quantum Key Search for Ternary LWE. 117-132 - Wouter Castryck
, Ann Dooms
, Carlo Emerencia
, Alexander Lemmens:
A Fusion Algorithm for Solving the Hidden Shift Problem in Finite Abelian Groups. 133-153 - Edward Eaton, Douglas Stebila
:
The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols. 154-173
Implementation and Side Channel Attack
- Tim Gellersen, Okan Seker, Thomas Eisenbarth
:
Differential Power Analysis of the Picnic Signature Scheme. 177-194 - Pauline Bert, Gautier Eberhart, Lucas Prabel, Adeline Roux-Langlois
, Mohamed Sabt:
Implementation of Lattice Trapdoors on Modules and Applications. 195-214 - Ruben Gonzalez, Andreas Hülsing
, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger
, Elisabeth Waitz, Thom Wiggers
, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. 215-233 - Duc Tri Nguyen, Kris Gaj:
Fast NEON-Based Multiplication for Lattice-Based NIST Post-quantum Cryptography Finalists. 234-254
Isogeny
- Ward Beullens, Lucas Disson, Robi Pedersen
, Frederik Vercauteren:
CSI-RAShi: Distributed Key Generation for CSIDH. 257-276 - Tako Boris Fouotsa
, Christophe Petit
:
SimS: A Simplification of SiGamal. 277-295 - Aaron Hutchinson, Koray Karabina, Geovandro Pereira:
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE. 296-315
Lattice-Based Cryptography
- Tamar Lichter Blanks, Stephen D. Miller
:
Generating Cryptographically-Strong Random Lattice Bases and Recognizing Rotations of $\mathbb {Z}^n$. 319-338 - San Ling
, Khoa Nguyen
, Duong Hieu Phan
, Hanh Tang
, Huaxiong Wang:
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. 339-359 - Jiaxin Pan
, Benedikt Wagner
:
Short Identity-Based Signatures with Tight Security from Lattices. 360-379 - Rouzbeh Behnia, Yilei Chen, Daniel Masny:
On Removing Rejection Conditions in Practical Lattice-Based Signatures. 380-398 - Xavier Boyen, Malika Izabachène, Qinyi Li:
Secure Hybrid Encryption in the Standard Model from Hard Learning Problems. 399-418
Cryptanalysis
- Tingting Guo
, Peng Wang
, Lei Hu, Dingfeng Ye:
Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting. 421-441 - Magali Bardet, Pierre Briaud:
An Algebraic Approach to the Rank Support Learning Problem. 442-462 - Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
:
Quantum Indistinguishability for Public Key Encryption. 463-482 - Prastudy Fauzi
, Martha Norberg Hovd, Håvard Raddum:
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. 483-498

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.