default search action
PQCrypto 2020: Paris, France
- Jintai Ding, Jean-Pierre Tillich:
Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings. Lecture Notes in Computer Science 12100, Springer 2020, ISBN 978-3-030-44222-4
Code-Based Cryptography
- Julian Renner, Thomas Jerkovits, Hannes Bartz, Sven Puchinger, Pierre Loidreau, Antonia Wachter-Zeh:
Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding Radius. 3-19 - Nicolas Sendrier, Valentin Vasseur:
About Low DFR for QC-MDPC Decoding. 20-34 - Nir Drucker, Shay Gueron, Dusan Kostic:
QC-MDPC Decoders with Several Shades of Gray. 35-50
Implementation
- James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi:
Isochronous Gaussian Sampling: From Inception to Implementation. 53-71 - Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-quantum Cryptography in TLS. 72-91 - Albrecht Petzoldt:
Efficient Key Generation for Rainbow. 92-107
Isogeny-Based Cryptography
- Wouter Castryck, Thomas Decru:
CSIDH on the Surface. 111-129 - Ward Beullens, Cyprien Delpech de Saint Guilhem:
LegRoast: Efficient Post-quantum Signatures from the Legendre PRF. 130-150 - Craig Costello, Benjamin Smith:
The Supersingular Isogeny Problem in Genus 2 and Beyond. 151-168 - Daniele Cozzo, Nigel P. Smart:
Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol. 169-186
Lattice-Based Cryptography
- Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden:
Defeating NewHope with a Single Trace. 189-205 - Nina Bindel, John M. Schanck:
Decryption Failure Is More Likely After Success. 206-225 - Jonathan Bootle, Anja Lehmann, Vadim Lyubashevsky, Gregor Seiler:
Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions. 226-246 - Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner:
Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy. 247-267 - Yang Tao, Xi Wang, Rui Zhang:
Short Zero-Knowledge Proof of Knowledge for Lattice-Based Commitment. 268-283 - Raymond K. Zhao, Ron Steinfeld, Amin Sakzad:
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers. 284-303
Multivariate Cryptography
- Daniel Apon, Dustin Moody, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme. 307-322 - Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi:
A Structural Attack on Block-Anti-Circulant UOV at SAC 2019. 323-339 - Bagus Santoso:
Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption. 340-359 - Daniel Smith-Tone:
Practical Cryptanalysis of k-ary C*. 360-380 - Daniel Smith-Tone, Javier A. Verbel:
A Rank Attack Against Extension Field Cancellation. 381-401 - Takanori Yasuda, Yacheng Wang, Tsuyoshi Takagi:
Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers. 402-421
Quantum Algorithms
- Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken:
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms. 425-444 - Alexander Helm, Alexander May:
The Power of Few Qubits and Collisions - Subset Sum Below Grover's Bound. 445-460 - Samir Hodzic, Lars Ramkilde Knudsen, Andreas Brasen Kidmose:
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability. 461-480
Security Proofs
- Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. 483-502 - Edward Eaton, Fang Song:
A Note on the Instantiability of the Quantum Random Oracle. 503-523 - Aldo Gunsing, Bart Mennink:
Collapseability of Tree Hashes. 524-538 - Juliane Krämer, Patrick Struck:
Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security. 539-558
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.