E-Book, Englisch, Band 13512, 523 Seiten, eBook
Cheon / Johansson Post-Quantum Cryptography
1. Auflage 2022
ISBN: 978-3-031-17234-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
E-Book, Englisch, Band 13512, 523 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-17234-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Code-Based Cryptography.- Hybrid Decoding - Classical-Quantum Trade-O s for Information Set Decoding.- How to Backdoor (Classic) McEliece and How to Guard Against Backdoors.- LRPC codes with multiple syndromes: near ideal-size KEMs without ideals.- Interleaved Prange: A New Generic Decoder for Interleaved Codes.- A Study of Error Floor Behavior in QC-MDPC Codes.- Multivariate Cryptography and the MinRank Problem.- Improvement of algebraic attacks for superdetermined MinRank.- A New Fault Attack on UOV Multivariate Signature Scheme.- MR-DSS - Smaller MinRank-based (Ring-)Signatures.- IPRainbow.- 2F - A New Method for Constructing E cient Multivariate Encryption Schemes.- Quantum Algorithms, Attacks and Models.- Quantum Attacks on Lai-Massey Structure.- Sponge-based Authenticated Encryption: Security against Quantum Attackers.- Post-quantum Plaintext-awareness.- On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP.- Implementation and Side channel attacks.- Effciently Masking Polynomial Inversion at Arbitrary Order.- A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem.- A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext.- Isogeny.- On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions.- Attack on SHealS and HealS: the Second Wave of GPST.- Post-Quantum Signal Key Agreement from SIDH.- Lattice-Based Cryptography.- Forward-Secure Revocable Secret Handshakes from Lattices.- Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm.- Cryptanalysis.- Breaking Category Five SPHINCS+ with SHA-256.