Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011. The 18 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems that have the potential to resist possible future quantum computers, classical and quantum attacks, and security models for the post-quantum era..

Author(s): Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai (auth.), Bo-Yin Yang (eds.)
Series: Lecture Notes in Computer Science 7071
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 295
Tags: Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Systems and Data Security; Discrete Mathematics in Computer Science

Front Matter....Pages -
General Fault Attacks on Multivariate Public Key Cryptosystems....Pages 1-18
Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies....Pages 19-34
Full Cryptanalysis of the Chen Identification Protocol....Pages 35-50
Decoding One Out of Many....Pages 51-67
On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack....Pages 68-82
Roots of Square: Cryptanalysis of Double-Layer Square and Square+....Pages 83-97
An Efficient Attack on All Concrete KKS Proposals....Pages 98-116
XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions....Pages 117-129
On the Differential Security of Multivariate Public Key Cryptosystems....Pages 130-142
Implementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded Devices....Pages 143-162
Efficient Threshold Encryption from Lossy Trapdoor Functions....Pages 163-178
Monoidic Codes in Cryptography....Pages 179-199
Simplified High-Speed High-Distance List Decoding for Alternant Codes....Pages 200-216
Statistical Decoding of Codes over $\mathbb{F}_q$ ....Pages 217-227
High-Speed Hardware Implementation of Rainbow Signature on FPGAs....Pages 228-243
Wild McEliece Incognito....Pages 244-254
A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys....Pages 255-274
A Security Analysis of Uniformly-Layered Rainbow....Pages 275-294
Back Matter....Pages -