


default search action
PQCrypto 2024: College Park, MD, USA - Part II
- Markku-Juhani O. Saarinen
, Daniel Smith-Tone:
Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14772, Springer 2024, ISBN 978-3-031-62745-3
Isogeny-Based Cryptography
- Tomoki Moriya
, Hiroshi Onuki
, Maozhi Xu, Guoqing Zhou:
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation. 3-19 - Antonin Leroux, Maxime Roméas:
Updatable Encryption from Group Actions. 20-53 - JeongHwan Lee
, Donghoe Heo
, Hyeonhak Kim
, GyuSang Kim
, Suhri Kim
, Heeseok Kim
, Seokhie Hong
:
Fault Attack on SQIsign. 54-76
Multivariate Cryptography
- Peigen Li
, Jintai Ding
:
Cryptanalysis of the SNOVA Signature Scheme. 79-91 - Pierre Pébereau:
One Vector to Rule Them All: Key Recovery from One Vector in UOV Schemes. 92-108 - Hiroki Furue, Momonari Kudo:
Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings. 109-143 - Benoît Cogliati, Gilles Macario-Rat, Jacques Patarin, Pierre Varjabedian:
State of the Art of HFE Variants - Is It Possible to Repair HFE with Appropriate Modifiers? 144-167 - Thomas Aulbach, Simona Samardjiska, Monika Trimoska:
Practical Key-Recovery Attack on MQ-Sign and More. 168-185 - Hao Guo
, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding:
Practical and Theoretical Cryptanalysis of VOX. 186-208
Quantum Algorithms
- Martin Ekerå
, Joel Gärtner
:
Extending Regev's Factoring Algorithm to Compute Discrete Logarithms. 211-242
Transforms and Proofs
- Kathrin Hövelmanns, Christian Majenz
:
A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness. 245-265 - Kamil Doruk Gür
, Jonathan Katz
, Tjerand Silde
:
Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption. 266-300 - Thomas Aulbach, Samed Düzlü, Michael Meyer
, Patrick Struck, Maximiliane Weishäupl:
Hash Your Keys Before Signing - BUFF Security of the Additional NIST PQC Signatures. 301-335 - Yao Cheng, Xianhui Lu, Ziyi Li
, Bao Li:
Revisiting Anonymity in Post-quantum Public Key Encryption. 336-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.