This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.
Author(s): Marco Baldi, Marco Bianchi, Franco Chiaraluce (auth.), Philippe Gaborit (eds.)
Series: Lecture Notes in Computer Science 7932 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2013
Language: English
Pages: 259
Tags: Data Encryption; Systems and Data Security; Quantum Computing; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity
Front Matter....Pages -
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures....Pages 1-15
Quantum Algorithms for the Subset-Sum Problem....Pages 16-33
Improved Lattice-Based Threshold Ring Signature Scheme....Pages 34-51
Degree of Regularity for HFEv and HFEv-....Pages 52-66
Software Speed Records for Lattice-Based Signatures....Pages 67-82
Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search....Pages 83-101
An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes....Pages 102-117
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations....Pages 118-135
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework....Pages 136-154
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme....Pages 155-164
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems....Pages 165-173
Secure and Anonymous Hybrid Encryption from Coding Theory....Pages 174-187
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes....Pages 188-202
The Hardness of Code Equivalence over $\mathbb{F}_q$ and Its Application to Code-Based Cryptography....Pages 203-216
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems....Pages 217-230
Simple Matrix Scheme for Encryption....Pages 231-242
Multivariate Signature Scheme Using Quadratic Forms....Pages 243-258
Back Matter....Pages -