LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals (Englisch)
- Neue Suche nach: Aguilar-Melchor, Carlos
- Neue Suche nach: Aragon, Nicolas
- Neue Suche nach: Dyseryn, Victor
- Neue Suche nach: Gaborit, Philippe
- Neue Suche nach: Zémor, Gilles
- Neue Suche nach: Cheon, Jung Hee
- Weitere Informationen zu Cheon, Jung Hee:
- https://orcid.org/https://orcid.org/0000-0002-7085-2220
- Neue Suche nach: Johansson, Thomas
- Neue Suche nach: Aguilar-Melchor, Carlos
- Neue Suche nach: Aragon, Nicolas
- Neue Suche nach: Dyseryn, Victor
- Neue Suche nach: Gaborit, Philippe
- Neue Suche nach: Zémor, Gilles
In:
Post-Quantum Cryptography
: 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
;
Kapitel: 3
;
45-68
;
2022
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Cheon, Jung Hee ( Herausgeber:in ) / Johansson, Thomas ( Herausgeber:in ) / Aguilar-Melchor, Carlos ( Autor:in ) / Aragon, Nicolas ( Autor:in ) / Dyseryn, Victor ( Autor:in ) / Gaborit, Philippe ( Autor:in ) / Zémor, Gilles ( Autor:in )
-
Kongress:International Conference on Post-Quantum Cryptography ; 2022
-
Erschienen in:Post-Quantum Cryptography : 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings ; Kapitel: 3 ; 45-68Lecture Notes in Computer Science ; 13512 ; 45-68
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:21.09.2022
-
Format / Umfang:24 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Hybrid Decoding – Classical-Quantum Trade-Offs for Information Set DecodingEsser, Andre / Ramos-Calderer, Sergi / Bellini, Emanuele / Latorre, José I. / Manzano, Marc et al. | 2022
- 2
-
How to Backdoor (Classic) McEliece and How to Guard Against BackdoorsHemmert, Tobias / May, Alexander / Mittmann, Johannes / Schneider, Carl Richard Theodor et al. | 2022
- 3
-
LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without IdealsAguilar-Melchor, Carlos / Aragon, Nicolas / Dyseryn, Victor / Gaborit, Philippe / Zémor, Gilles et al. | 2022
- 4
-
Interleaved Prange: A New Generic Decoder for Interleaved CodesPorwal, Anmoal / Holzbaur, Lukas / Liu, Hedongliang / Renner, Julian / Wachter-Zeh, Antonia / Weger, Violetta et al. | 2022
- 5
-
A Study of Error Floor Behavior in QC-MDPC CodesArpin, Sarah / Billingsley, Tyler Raven / Hast, Daniel Rayor / Lau, Jun Bo / Perlner, Ray / Robinson, Angela et al. | 2022
- 6
-
Improvement of Algebraic Attacks for Solving Superdetermined MinRank InstancesBardet, Magali / Bertin, Manon et al. | 2022
- 7
-
A New Fault Attack on UOV Multivariate Signature SchemeFurue, Hiroki / Kiyomura, Yutaro / Nagasawa, Tatsuya / Takagi, Tsuyoshi et al. | 2022
- 8
-
MR-DSS – Smaller MinRank-Based (Ring-)SignaturesBellini, Emanuele / Esser, Andre / Sanna, Carlo / Verbel, Javier et al. | 2022
- 9
-
IPRainbowCartor, Ryann / Cartor, Max / Lewis, Mark / Smith-Tone, Daniel et al. | 2022
- 10
-
2F - A New Method for Constructing Efficient Multivariate Encryption SchemesSmith-Tone, Daniel et al. | 2022
- 11
-
Quantum Attacks on Lai-Massey StructureMao, Shuping / Guo, Tingting / Wang, Peng / Hu, Lei et al. | 2022
- 12
-
Sponge-Based Authenticated Encryption: Security Against Quantum AttackersJanson, Christian / Struck, Patrick et al. | 2022
- 13
-
Post-quantum Plaintext-AwarenessEbrahimi, Ehsan / van Wier, Jeroen et al. | 2022
- 14
-
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEPKrämer, Juliane / Struck, Patrick et al. | 2022
- 15
-
Efficiently Masking Polynomial Inversion at Arbitrary OrderKrausz, Markus / Land, Georg / Richter-Brockmann, Jan / Güneysu, Tim et al. | 2022
- 16
-
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC CryptosystemSchamberger, Thomas / Holzbaur, Lukas / Renner, Julian / Wachter-Zeh, Antonia / Sigl, Georg et al. | 2022
- 17
-
A New Key Recovery Side-Channel Attack on HQC with Chosen CiphertextGoy, Guillaume / Loiseau, Antoine / Gaborit, Philippe et al. | 2022
- 18
-
On Actively Secure Fine-Grained Access Structures from Isogeny AssumptionsCampos, Fabio / Muth, Philipp et al. | 2022
- 19
-
Attack on SHealS and HealS: The Second Wave of GPSTGalbraith, Steven D. / Lai, Yi-Fu et al. | 2022
- 20
-
Post-Quantum Signal Key Agreement from SIDHDobson, Samuel / Galbraith, Steven D. et al. | 2022
- 21
-
Forward-Secure Revocable Secret Handshakes from LatticesAn, Zhiyuan / Pan, Jing / Wen, Yamin / Zhang, Fangguo et al. | 2022
- 22
-
Estimating the Hidden Overheads in the BDGL Lattice Sieving AlgorithmDucas, Léo et al. | 2022
- 23
-
Breaking Category Five SPHINCS\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$^+$$\end{document} with SHA-256Perlner, Ray / Kelsey, John / Cooper, David et al. | 2022