


default search action
PQCrypto 2026: Saint-Malo, France - Part II
- Magali Bardet, Ruben Niederhagen:

Post-Quantum Cryptography - 17th International Workshop, PQCrypto 2026, Saint-Malo, France, April 14-16, 2026, Proceedings, Part II. Lecture Notes in Computer Science 16492, Springer 2026, ISBN 978-3-032-22697-6
Isogeny- and Group-Action-Based Cryptography
- Sabrina Kunzweiler, Min-Yi Shen:

Endomorphisms via Splittings. 3-38 - Thomas den Hollander

, Marzio Mula
, Daniel Slamanig
, Sebastian A. Spindler
:
On the Use of Atkin and Weber Modular Polynomials in Isogeny Proofs of Knowledge. 39-73 - Tako Boris Fouotsa, Marc Houben, Gioella Lorenzon, Ryan Rueger, Parsa Tasbihgou:

On the Active Security of the PEARL-SCALLOP Group Action. 74-104
Cryptographic Protocols and PQC Transition
- Behzad Abdolmaleki, John Clark, Mohammad Foroutani, Shahram Khazaei, Sajjad Nasirzadeh:

A Practical Framework for Lattice-Based Non-interactive Publicly Verifiable Secret Sharing. 107-142 - Julien Devevey, Morgane Guerreau, Maxime Roméas:

Compact, Efficient and Non-separable Hybrid Signatures. 143-177 - Antonio Guimarães

, Gabriela M. Jacob
, Hilder V. L. Pereira
:
PETCHA: Post-quantum Efficient Transciphering with ChaCha. 178-203
Code-Based Attacks
- Alessandro Budroni, Marco Defranceschi

, Federico Pintore:
Recursion Enabled: Improved Cryptanalysis of the Permuted Kernel Problem. 207-241 - Philippe Gaborit, Philippe Krejci, Cristina Onete:

Breaking RHQC's Post-Compromise Security. 242-274 - Lorenz Panny:

On Breaking McEliece Keys Using Brute Force. 275-308
Cryptanalysis and Fault Attacks
- Paco Poilbout, Thomas Roche, Laurent Imbert:

Handling Noisy Plaintext Checking Oracles with SPiRiT - Application to Kyber. 311-341 - Paola de Perthuis, Filip Trenkic:

Refined Modelling of the Primal Attack, and Variants Against Module-LWE. 342-376 - Ryo Ohashi

, Hiroshi Onuki
:
A Collision Attack on the LTZ Hash Function Based on a Conjecture on Supersingular Non-superspecial Isogeny Graphs of Dimension 2. 377-408 - Harrison Banda, Jan Brinkmann, Juliane Krämer:

Fault Attacks on MPCitH Signature Schemes. 409-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














