default search action
PQCrypto 2023: College Park, MD, USA
- Thomas Johansson, Daniel Smith-Tone:
Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings. Lecture Notes in Computer Science 14154, Springer 2023, ISBN 978-3-031-40002-5
Code-Based Cryptography
- Alain Couvreur, Ilaria Zappatore:
An Extension of Overbeck's Attack with an Application to Cryptanalysis of Twisted Gabidulin-Based Schemes. 3-37 - Pierre Briaud, Pierre Loidreau:
Cryptanalysis of Rank-Metric Schemes Based on Distorted Gabidulin Codes. 38-56 - Luke Beckwith, Robert Wallace, Kamyar Mohajerani, Kris Gaj:
A High-Performance Hardware Implementation of the LESS Digital Signature Scheme. 57-90 - Nicolas Sendrier:
Wave Parameter Selection. 91-110
Group-Action-Based Cryptography
- Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures. 113-138
Isogeny-Based Cryptography
- Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata:
A Tightly Secure Identity-Based Signature Scheme from Isogenies. 141-163
Lattice-Based Cryptography
- Elena Kirshanova, Alexander May, Julian Nowakowski:
New NTRU Records with Improved Lattice Bases. 167-195 - Karim Eldefrawy, Nicholas Genise, Nathan Manohar:
On the Hardness of Scheme-Switching Between SIMD FHE Schemes. 196-224 - André Chailloux, Johanna Loyer:
Classical and Quantum 3 and 4-Sieves to Solve SVP with Low Memory. 225-255 - Cong Ling, Andrew Mendelsohn:
NTRU in Quaternion Algebras of Bounded Discriminant. 256-290 - Qian Guo, Erik Mårtensson:
Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber. 291-320 - Joel Gärtner:
NTWE: A Natural Combination of NTRU and LWE. 321-353
Multivariate Cryptography
- Hiroki Furue, Tsuyoshi Takagi:
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. 357-378 - Ignacio Luengo, Martin E. Avendano, Pilar Coscojuela:
DME: A Full Encryption, Signature and KEM Multivariate Public Key Cryptosystem. 379-402
Quantum Algorithms, Cryptanalysis and Models
- Serge Fehr, Yu-Hsuan Huang:
On the Quantum Security of HAWK. 405-416 - Navid Alamati, Varun Maram, Daniel Masny:
Non-Observable Quantum Random Oracle Model. 417-444 - Tristan Nemoz, Zoé Amblard, Aurélien Dupin:
Characterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of Operation. 445-475 - Vincent Quentin Ulitzsch, Jean-Pierre Seifert:
Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications' Cryptographic Backbone. 476-504 - Maxime Remaud, André Schrottenloher, Jean-Pierre Tillich:
Time and Query Complexity Tradeoffs for the Dihedral Coset Problem. 505-532
Post-Quantum Protocols
- Jason Goertzen, Douglas Stebila:
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation. 535-564 - Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-Based Direct Anonymous Attestation. 565-600 - Sonja Bruckner, Sebastian Ramacher, Christoph Striecks:
Muckle+: End-to-End Hybrid Authenticated Key Exchanges. 601-633
Side-Channel Cryptanalysis and Countermeasures
- Markku-Juhani O. Saarinen:
WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography. 637-657 - Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, Emanuele Strieder:
Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or SPHINCS+ Signatures. 658-687 - Hauke Malte Steffen, Georg Land, Lucie Johanna Kogelheide, Tim Güneysu:
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware. 688-711
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.