Post-Quantum Cryptography [E-Book] : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II / edited by Markku-Juhani Saarinen, Daniel Smith-Tone.
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized...
Saved in:
Full text |
|
Personal Name(s): | Saarinen, Markku-Juhani, editor |
Smith-Tone, Daniel, editor | |
Edition: |
1st edition 2024. |
Imprint: |
Cham :
Springer,
2024
|
Physical Description: |
XII, 372 pages 69 illustrations, 11 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783031627460 |
DOI: |
10.1007/978-3-031-62746-0 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Computer Science ;
14772 |
Subject (LOC): |
- Isogeny-Based Cryptography
- Adaptive attacks against FESTA without input validation or constant time implementation
- Updatable Encryption from Group Actions
- Fault Attack on SQIsign
- Multivariate Cryptography
- Cryptanalysis of the SNOVA Signature Scheme
- One vector to rule them all Key recovery from one vector in UOV schemes
- Polynomial XL A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings
- State of the art of HFE variants Is it possible to repair HFE with appropriate modifiers
- Practical key recovery attack on MQ Sign and more
- Practical and Theoretical Cryptanalysis of VOX.-Quantum Algorithms
- Extending Regevs Factoring Algorithm to Compute Discrete Logarithms
- Transforms and Proofs
- A note on Failing gracefully Completing the picture for explicitly rejecting Fujisaki Okamoto transforms using worst case correctness
- Two Round Threshold Lattice Based Signatures from Threshold Homomorphic Encryption
- Hash your Keys before Signing BUFF Security of the Additional NIST PQC Signatures
- Revisiting Anonymity in Post Quantum Public Key Encryption.