Post-Quantum Cryptography
Springer International Publishing (Verlag)
978-3-031-17233-5 (ISBN)
The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. The papers are categorized in the following topical sub-headings: Code-Based Cryptography; Multivariate Cryptography and the MinRank Problem; Quantum Algorithims, Attacks and Models; Implementation and Side Channel Attacks; Isogeny; Lattice-based Cryptography; Cryptanalysis.
Code-Based Cryptography.- Hybrid Decoding - Classical-Quantum Trade-O s for Information Set Decoding.- How to Backdoor (Classic) McEliece and How to Guard Against Backdoors.- LRPC codes with multiple syndromes: near ideal-size KEMs without ideals.- Interleaved Prange: A New Generic Decoder for Interleaved Codes.- A Study of Error Floor Behavior in QC-MDPC Codes.- Multivariate Cryptography and the MinRank Problem.- Improvement of algebraic attacks for superdetermined MinRank.- A New Fault Attack on UOV Multivariate Signature Scheme.- MR-DSS - Smaller MinRank-based (Ring-)Signatures.- IPRainbow.- 2F - A New Method for Constructing E cient Multivariate Encryption Schemes.- Quantum Algorithms, Attacks and Models.- Quantum Attacks on Lai-Massey Structure.- Sponge-based Authenticated Encryption: Security against Quantum Attackers.- Post-quantum Plaintext-awareness.- On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP.- Implementation and Side channel attacks.- Effciently Masking Polynomial Inversion at Arbitrary Order.- A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem.- A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext.- Isogeny.- On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions.- Attack on SHealS and HealS: the Second Wave of GPST.- Post-Quantum Signal Key Agreement from SIDH.- Lattice-Based Cryptography.- Forward-Secure Revocable Secret Handshakes from Lattices.- Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm.- Cryptanalysis.- Breaking Category Five SPHINCS+ with SHA-256.
Erscheinungsdatum | 28.09.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XI, 523 p. 119 illus., 36 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 755 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • authentication • ciphertexts • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Cryptosystems • Data Security • electronic document identification systems • Informatics • Information Theory • Network Protocols • Network Security • private key • Public Key Cryptography • Research • Signal Processing |
ISBN-10 | 3-031-17233-7 / 3031172337 |
ISBN-13 | 978-3-031-17233-5 / 9783031172335 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich