


default search action
PQCrypto 2019: Chongqing, China
- Jintai Ding, Rainer Steinwandt:

Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11505, Springer 2019, ISBN 978-3-030-25509-1
Lattice-Based Cryptography
- Emmanouil Doulgerakis, Thijs Laarhoven

, Benne de Weger:
Finding Closest Lattice Vectors Using Approximate Voronoi Cells. 3-22 - Farnoud Farahmand, Viet Ba Dang, Duc Tri Nguyen, Kris Gaj:

Evaluating the Potential for Hardware Acceleration of Four NTRU-Based Key Encapsulation Mechanisms Using Software/Hardware Codesign. 23-43 - San Ling

, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Forward-Secure Group Signatures from Lattices. 44-64 - Tobias Oder, Julian Speith

, Kira Höltgen, Tim Güneysu
:
Towards Practical Microcontroller Implementation of the Signature Scheme Falcon. 65-80
Learning with Errors
- Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven

, Ronald Rietman, Markku-Juhani O. Saarinen
, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-quantum Public-Key Encryption. 83-102 - Jan-Pieter D'Anvers

, Frederik Vercauteren, Ingrid Verbauwhede
:
The Impact of Error Dependencies on Ring/Mod-LWE/LWR Based Schemes. 103-115 - Xavier Boyen, Qinyi Li:

Direct CCA-Secure KEM and Deterministic PKE from Plain LWE. 116-130
Cryptanalysis
- Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich:

Recovering Short Secret Keys of RLCE in Polynomial Time. 133-152 - Zhen Liu, Yanbin Pan, Zhenfei Zhang:

Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15. 153-166 - Javier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone:

On the Complexity of "Superdetermined" Minrank Instances. 167-186
Key Establishment
- Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz:

Constant-Round Group Key Exchange from the Ring-LWE Assumption. 189-205 - Nina Bindel

, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. 206-226 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:

Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model. 227-248 - Keita Xagawa

, Takashi Yamakawa:
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model. 249-268
Isogeny-Based Cryptography
- Thomas Decru, Lorenz Panny, Frederik Vercauteren:

Faster SeaSign Signatures Through Improved Rejection Sampling. 271-285 - E. Victor Flynn, Yan Bo Ti

:
Genus Two Isogeny Cryptography. 286-306 - Michael Meyer

, Fabio Campos
, Steffen Reith:
On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH. 307-325
Hash-Based Cryptography
- Ben Hamlin, Fang Song:

Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing. 329-349 - Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani

, Keita Xagawa
:
Improved Quantum Multicollision-Finding Algorithm. 350-367
Code-Based Cryptography
- Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, Etienne Marcatel:

Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes. 371-386 - Pedro Branco, Paulo Mateus

:
A Traceable Ring Signature Scheme Based on Coding Theory. 387-403 - Nicolas Sendrier, Valentin Vasseur

:
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders. 404-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














