UID:
almahu_9949371962002882
Format:
XI, 523 p. 119 illus., 36 illus. in color.
,
online resource.
Edition:
1st ed. 2022.
ISBN:
9783031172342
Series Statement:
Lecture Notes in Computer Science, 13512
Content:
This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. The papers are categorized in the following topical sub-headings: Code-Based Cryptography; Multivariate Cryptography and the MinRank Problem; Quantum Algorithims, Attacks and Models; Implementation and Side Channel Attacks; Isogeny; Lattice-based Cryptography; Cryptanalysis.
Note:
Code-Based Cryptography -- Hybrid Decoding - Classical-Quantum Trade-O s for Information Set Decoding -- How to Backdoor (Classic) McEliece and How to Guard Against Backdoors -- LRPC codes with multiple syndromes: near ideal-size KEMs without ideals -- Interleaved Prange: A New Generic Decoder for Interleaved Codes -- A Study of Error Floor Behavior in QC-MDPC Codes -- Multivariate Cryptography and the MinRank Problem -- Improvement of algebraic attacks for superdetermined MinRank -- A New Fault Attack on UOV Multivariate Signature Scheme -- MR-DSS - Smaller MinRank-based (Ring-)Signatures -- IPRainbow -- 2F - A New Method for Constructing E cient Multivariate Encryption Schemes -- Quantum Algorithms, Attacks and Models -- Quantum Attacks on Lai-Massey Structure -- Sponge-based Authenticated Encryption: Security against Quantum Attackers -- Post-quantum Plaintext-awareness -- On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP -- Implementation and Side channel attacks -- Effciently Masking Polynomial Inversion at Arbitrary Order -- A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem -- A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext -- Isogeny -- On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions -- Attack on SHealS and HealS: the Second Wave of GPST -- Post-Quantum Signal Key Agreement from SIDH -- Lattice-Based Cryptography -- Forward-Secure Revocable Secret Handshakes from Lattices -- Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm -- Cryptanalysis -- Breaking Category Five SPHINCS+ with SHA-256.
In:
Springer Nature eBook
Additional Edition:
Printed edition: ISBN 9783031172335
Additional Edition:
Printed edition: ISBN 9783031172359
Language:
English
DOI:
10.1007/978-3-031-17234-2
URL:
https://doi.org/10.1007/978-3-031-17234-2