


default search action
PQCrypto 2022: Virtual Event
- Jung Hee Cheon

, Thomas Johansson
:
Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13512, Springer 2022, ISBN 978-3-031-17233-5
Code-Based Cryptography
- Andre Esser

, Sergi Ramos-Calderer
, Emanuele Bellini
, José I. Latorre
, Marc Manzano:
Hybrid Decoding - Classical-Quantum Trade-Offs for Information Set Decoding. 3-23 - Tobias Hemmert, Alexander May

, Johannes Mittmann
, Carl Richard Theodor Schneider
:
How to Backdoor (Classic) McEliece and How to Guard Against Backdoors. 24-44 - Carlos Aguilar Melchor, Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Gilles Zémor:

LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals. 45-68 - Anmoal Porwal, Lukas Holzbaur, Hedongliang Liu, Julian Renner, Antonia Wachter-Zeh, Violetta Weger

:
Interleaved Prange: A New Generic Decoder for Interleaved Codes. 69-88 - Sarah Arpin

, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray A. Perlner, Angela Robinson:
A Study of Error Floor Behavior in QC-MDPC Codes. 89-103
Multivariate Cryptography and the MinRank Problem
- Magali Bardet, Manon Bertin:

Improvement of Algebraic Attacks for Solving Superdetermined MinRank Instances. 107-123 - Hiroki Furue, Yutaro Kiyomura, Tatsuya Nagasawa, Tsuyoshi Takagi:

A New Fault Attack on UOV Multivariate Signature Scheme. 124-143 - Emanuele Bellini

, Andre Esser
, Carlo Sanna
, Javier A. Verbel
:
MR-DSS - Smaller MinRank-Based (Ring-)Signatures. 144-169 - Ryann Cartor

, Max Cartor, Mark Lewis, Daniel Smith-Tone:
IPRainbow. 170-184 - Daniel Smith-Tone:

2F - A New Method for Constructing Efficient Multivariate Encryption Schemes. 185-201
Quantum Algorithms, Attacks and Models
- Shuping Mao, Tingting Guo

, Peng Wang
, Lei Hu:
Quantum Attacks on Lai-Massey Structure. 205-229 - Christian Janson, Patrick Struck

:
Sponge-Based Authenticated Encryption: Security Against Quantum Attackers. 230-259 - Ehsan Ebrahimi

, Jeroen van Wier:
Post-quantum Plaintext-Awareness. 260-285 - Juliane Krämer, Patrick Struck

:
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP. 286-306
Implementation and Side Channel Attacks
- Markus Krausz

, Georg Land
, Jan Richter-Brockmann
, Tim Güneysu
:
Efficiently Masking Polynomial Inversion at Arbitrary Order. 309-326 - Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl:

A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem. 327-352 - Guillaume Goy, Antoine Loiseau, Philippe Gaborit:

A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext. 353-371
Isogeny
- Fabio Campos

, Philipp Muth:
On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions. 375-398 - Steven D. Galbraith

, Yi-Fu Lai
:
Attack on SHealS and HealS: The Second Wave of GPST. 399-421 - Samuel Dobson

, Steven D. Galbraith
:
Post-Quantum Signal Key Agreement from SIDH. 422-450
Lattice-Based Cryptography
- Zhiyuan An

, Jing Pan, Yamin Wen, Fangguo Zhang
:
Forward-Secure Revocable Secret Handshakes from Lattices. 453-479 - Léo Ducas:

Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm. 480-497
Cryptanalysis
- Ray A. Perlner, John Kelsey, David A. Cooper:

Breaking Category Five SPHINCS+ with SHA-256. 501-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














