The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PQCrypto"( http://dblp.L3S.de/Venues/PQCrypto )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pqcrypto

Publication years (Num. hits)
2008 (16) 2010 (17) 2011 (19) 2013 (18) 2014 (17) 2016 (17) 2017 (24) 2018 (25) 2019 (23) 2020 (30) 2021 (26) 2022 (24) 2023 (26)
Publication types (Num. hits)
inproceedings(269) proceedings(13)
Venues (Conferences, Journals, ...)
PQCrypto(282)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 29 occurrences of 20 keywords

Results
Found 282 publication records. Showing 282 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Daniel Cabarcas, Patrick Weiden, Johannes Buchmann 0001 On the Efficiency of Provably Secure NTRU. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Albrecht Petzoldt, Lih-Chung Wang The Cubic Simple Matrix Encryption Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fang Song 0001 A Note on Quantum Security for Post-Quantum Cryptography. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jaiberth Porras, John Baena, Jintai Ding ZHFE, a New Multivariate Public Key Encryption Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chris Peikert Lattice Cryptography for the Internet. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dustin Moody, Ray A. Perlner, Daniel Smith-Tone An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michele Mosca (eds.) Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Philippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor RankSign: An Efficient Signature Algorithm Based on the Rank Metric. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Taylor Daniels, Daniel Smith-Tone Differential Properties of the HFE Cryptosystem. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ray A. Perlner Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Jao, Vladimir Soukharev Isogeny-Based Quantum-Resistant Undeniable Signatures. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte Transcript Secure Signatures Based on Modular Lattices. Search on Bibsonomy PQCrypto The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai Multivariate Signature Scheme Using Quadratic Forms. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Stacey Jeffery, Tanja Lange 0001, Alexander Meurer Quantum Algorithms for the Subset-Sum Problem. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe Software Speed Records for Lattice-Based Signatures. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Edoardo Persichetti Secure and Anonymous Hybrid Encryption from Coding Theory. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ray A. Perlner, Daniel Smith-Tone A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xuyun Nie, Zhaohu Xu, Johannes Buchmann 0001 Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michele Mosca, Douglas Stebila, Berkant Ustaoglu Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Bo-Yin Yang Degree of Regularity for HFEv and HFEv-. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thijs Laarhoven, Michele Mosca, Joop van de Pol Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Grégory Landais, Jean-Pierre Tillich An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Philippe Gaborit (eds.) Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Falko Strenzke Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chengdong Tao, Adama Diene, Shaohua Tang, Jintai Ding Simple Matrix Scheme for Encryption. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nicolas Sendrier, Dimitris E. Simos The Hardness of Code Equivalence over and Its Application to Code-Based Cryptography. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Slim Bettaieb, Julien Schrek Improved Lattice-Based Threshold Ring Signature Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters Wild McEliece Incognito. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bo-Yin Yang (eds.) Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lawrence M. Ioannou, Michele Mosca A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nicolas Sendrier Decoding One Out of Many. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Philippe Gaborit, Julien Schrek, Gilles Zémor Full Cryptanalysis of the Chen Identification Protocol. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen 0004, Guomin Chen High-Speed Hardware Implementation of Rainbow Signature on FPGAs. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiang Xie, Rui Xue 0001, Rui Zhang 0002 Efficient Threshold Encryption from Lossy Trapdoor Functions. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein Simplified High-Speed High-Distance List Decoding for Alternant Codes. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Takanori Yasuda, Kouichi Sakurai A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David Jao, Luca De Feo Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ayoub Otmani, Jean-Pierre Tillich An Efficient Attack on All Concrete KKS Proposals. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel Smith-Tone On the Differential Security of Multivariate Public Key Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Heyse Implementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded Devices. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Erik Dahmen, Andreas Hülsing XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Enrico Thomae, Christopher Wolf Roots of Square: Cryptanalysis of Double-Layer Square and Square+. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai General Fault Attacks on Multivariate Public Key Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert Niebuhr Statistical Decoding of Codes over $\mathbb{F}_q$. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki Monoidic Codes in Cryptography. Search on Bibsonomy PQCrypto The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Falko Strenzke A Timing Attack against the Secret Permutation in the McEliece PKC. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 Selecting Parameters for the Rainbow Signature Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Delphine Boucher, Philippe Gaborit, Willi Geiselmann, Olivier Ruatta, Felix Ulmer Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Wieschebrink Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Timothy J. Hodges, Victoria Kruglov Growth of the Ideal Generated by a Quadratic Boolean Function. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein Grover vs. McEliece. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pierre Loidreau Designing a Rank Metric Based McEliece Cryptosystem. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Heyse Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Crystal Lee Clough, Jintai Ding Secure Variants of the Square Encryption Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christiane Peters Information-Set Decoding for Linear Codes over Fq. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita Proposal of a Signature Scheme Based on STS Trapdoor. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Heyse, Amir Moradi 0001, Christof Paar Practical Power Analysis Attacks on Software Implementations of McEliece. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel Smith-Tone Properties of the Discrete Differential with Cryptographic Applications. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Rückert Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Dieter Schmidt Mutant Zhuang-Zi Algorithm. Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nicolas Sendrier (eds.) Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings Search on Bibsonomy PQCrypto The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters Attacking and Defending the McEliece Cryptosystem. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stern attack, minimal weight code word, list decoding binary Goppa codes, security analysis, McEliece cryptosystem
1Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF piece in hand concept, perturbation vector, public key cryptosystem, multivariate polynomial, multivariate public key cryptosystem
1Matthieu Finiasz Syndrome Based Collision Resistant Hashing. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, provable security, syndrome decoding
1Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gröbner basis, multivariate public key cryptosystem
1Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Digital Signatures Out of Second-Preimage Resistant Hash Functions. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF second-preimage resistance, provable security, Merkle signatures
1John Baena, Crystal Clough, Jintai Ding Square-Vinegar Signature Scheme. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HFEv?, Odd Characteristic, Signature Scheme, Multivariate Cryptography
1Bhaskar Biswas, Nicolas Sendrier McEliece Cryptosystem Implementation: Theory and Practice. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF McEliece encryption scheme, cryptographic implementation, public-key cryptosystem, code-based cryptography
1Johannes Buchmann 0001, Jintai Ding (eds.) Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Richard Lindner, Markus Rückert Explicit Hard Instances of the Shortest Vector Problem. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF challenge, Lattice reduction, lattice-based cryptography
1Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang Secure PRNGs from Specialized Polynomial Maps over Any . Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sparse multivariate polynomial map, hash function, provable security, PRNG
1Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann 0001 MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Erik Dahmen, Michael Schneider 0002 Merkle Tree Traversal Revisited. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication path computation, Merkle tree traversal, digital signatures, post-quantum cryptography, Merkle signatures
1Akinori Kawachi, Christopher Portmann On the Power of Quantum Encryption Keys. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan Side Channels in the McEliece PKC. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attack, timing attack, post quantum cryptography
1Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold ring signature, Stern’s Scheme, syndrome decoding, code-based cryptography
1Jintai Ding, John Wagner Cryptanalysis of Rational Multivariate Public Key Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #282 of 282 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license