Post-Quantum Cryptography

Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

  • Johannes Buchmann
  • Jintai Ding
Conference proceedings PQCrypto 2008

DOI: 10.1007/978-3-540-88403-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5299)

Table of contents (15 papers)

  1. Front Matter
  2. A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
    Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit
    Pages 1-16
  3. Square-Vinegar Signature Scheme
    John Baena, Crystal Clough, Jintai Ding
    Pages 17-30
  4. Attacking and Defending the McEliece Cryptosystem
    Daniel J. Bernstein, Tanja Lange, Christiane Peters
    Pages 31-46
  5. McEliece Cryptosystem Implementation: Theory and Practice
    Bhaskar Biswas, Nicolas Sendrier
    Pages 47-62
  6. Merkle Tree Traversal Revisited
    Johannes Buchmann, Erik Dahmen, Michael Schneider
    Pages 63-78
  7. Explicit Hard Instances of the Shortest Vector Problem
    Johannes Buchmann, Richard Lindner, Markus Rückert
    Pages 79-94
  8. Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives
    Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang
    Pages 95-108
  9. Digital Signatures Out of Second-Preimage Resistant Hash Functions
    Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    Pages 109-123
  10. Syndrome Based Collision Resistant Hashing
    Matthieu Finiasz
    Pages 137-147
  11. On the Power of Quantum Encryption Keys
    Akinori Kawachi, Christopher Portmann
    Pages 165-180
  12. Secure PRNGs from Specialized Polynomial Maps over Any \(\mathbb{F}_{q}\)
    Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang
    Pages 181-202
  13. MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
    Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann
    Pages 203-215
  14. Side Channels in the McEliece PKC
    Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan
    Pages 216-229
  15. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008.

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.


AES McEliece cryptosy access control authentication code-based cryptography coding theory cryptanalysis cryptographic protocols cryptography cryptology digital signatures elliptic curves hash function hash functions quantum cryptography

Editors and affiliations

  • Johannes Buchmann
    • 1
  • Jintai Ding
    • 2
  1. 1.Department of Computer ScienceTechnische Universität DarmstadtDarmstadtGermany
  2. 2.University of CincinnatiUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-88402-6
  • Online ISBN 978-3-540-88403-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349