Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations.

Author(s): Michele Mosca (eds.)
Series: Lecture Notes in Computer Science 8772 Security and Cryptology
Edition: 1
Publisher: Springer International Publishing
Year: 2014

Language: English
Pages: 284
Tags: Data Encryption; Systems and Data Security; Quantum Computing; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Sealing the Leak on Classical NTRU Signatures....Pages 1-21
On the Efficiency of Provably Secure NTRU....Pages 22-39
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics....Pages 40-58
Differential Properties of the HFE Cryptosystem....Pages 59-75
The Cubic Simple Matrix Encryption Scheme....Pages 76-87
RankSign: An Efficient Signature Algorithm Based on the Rank Metric....Pages 88-107
Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013....Pages 108-125
Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware....Pages 126-141
Transcript Secure Signatures Based on Modular Lattices....Pages 142-159
Isogeny-Based Quantum-Resistant Undeniable Signatures....Pages 160-179
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme....Pages 180-196
Lattice Cryptography for the Internet....Pages 197-219
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes....Pages 220-228
ZHFE, a New Multivariate Public Key Encryption Scheme....Pages 229-245
A Note on Quantum Security for Post-Quantum Cryptography....Pages 246-265
Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices....Pages 266-282
Back Matter....Pages -