Post-Quantum Cryptography [E-Book] : 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings / edited by Jung Hee Cheon, Jean-Pierre Tillich.
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of re...
Saved in:
Full text |
|
Personal Name(s): | Cheon, Jung Hee, editor |
Tillich, Jean-Pierre, editor | |
Edition: |
1st edition 2021. |
Imprint: |
Cham :
Springer,
2021
|
Physical Description: |
XIII, 500 pages 73 illustrations, 20 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030812935 |
DOI: |
10.1007/978-3-030-81293-5 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Security and Cryptology ;
12841 /* Depending on the record driver, $field may either be an array with "name" and "number" keys or a flat string containing only the series name. We should account for both cases to maximize compatibility. */?> Lecture Notes in Computer Science |
Subject (LOC): |
- Code-Based Cryptography
- Decoding supercodes of Gabidulin codes and applications to cryptanalysis
- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action
- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
- Multivariate Cryptography
- Improving Thomae-Wolf Algorithm for Solving Underdetermined
- Multivariate Quadratic Polynomial Problem
- New Practical Multivariate Signatures from a Nonlinear Modifier
- On the Effect of Projection on Rank Attacks in Multivariate Cryptography
- Quantum Algorithms
- Quantum Key Search for Ternary LWE
- A fusion algorithm for solving the hidden shift problem in finite abelian groups
- The "quantum annoying" property of password-authenticated key exchange protocols
- Implementation and Side channel attack
- Differential Power Analysis of the Picnic Signature Scheme
- Implementation of Lattice Trapdoors on Modules and Applications
- Verifying Post-Quantum Signatures in 8 KiB of RAM
- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists
- Isogeny
- CSI-RAShi: Distributed key generation for CSIDH
- SimS: a Simplification of SiGamal
- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE
- Lattice-Based Cryptography
- Generating cryptographically-strong random lattice bases and recognizing rotations of Z
- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions
- Short Identity-Based Signatures with Tight Security from Lattices
- On Removing Rejection Conditions in Practical Lattice-Based Signatures
- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems
- Cryptanalysis
- Attack on Beyond-Birthday-Bound MACs in Quantum Setting
- An algebraic approach to the Rank Support Learning problem
- Quantum Indistinguishability for Public Key Encryption
- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.