Post-Quantum Cryptography

4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings

  • Bo-Yin Yang
Conference proceedings PQCrypto 2011

DOI: 10.1007/978-3-642-25405-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7071)

Table of contents (18 papers)

  1. Front Matter
  2. General Fault Attacks on Multivariate Public Key Cryptosystems
    Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai
    Pages 1-18
  3. Full Cryptanalysis of the Chen Identification Protocol
    Philippe Gaborit, Julien Schrek, Gilles Zémor
    Pages 35-50
  4. Decoding One Out of Many
    Nicolas Sendrier
    Pages 51-67
  5. On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack
    Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari
    Pages 68-82
  6. Roots of Square: Cryptanalysis of Double-Layer Square and Square+
    Enrico Thomae, Christopher Wolf
    Pages 83-97
  7. An Efficient Attack on All Concrete KKS Proposals
    Ayoub Otmani, Jean-Pierre Tillich
    Pages 98-116
  8. XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions
    Johannes Buchmann, Erik Dahmen, Andreas Hülsing
    Pages 117-129
  9. Efficient Threshold Encryption from Lossy Trapdoor Functions
    Xiang Xie, Rui Xue, Rui Zhang
    Pages 163-178
  10. Monoidic Codes in Cryptography
    Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
    Pages 179-199
  11. High-Speed Hardware Implementation of Rainbow Signature on FPGAs
    Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen
    Pages 228-243
  12. Wild McEliece Incognito
    Daniel J. Bernstein, Tanja Lange, Christiane Peters
    Pages 244-254
  13. A Security Analysis of Uniformly-Layered Rainbow
    Takanori Yasuda, Kouichi Sakurai
    Pages 275-294
  14. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011. The 18 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems that have the potential to resist possible future quantum computers, classical and quantum attacks, and security models for the post-quantum era..

Keywords

elliptic curves fault attacks goppa codes multivariate cryptography provable security

Editors and affiliations

  • Bo-Yin Yang
    • 1
  1. 1.Academia SinicaTaipeiTaiwan

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25404-8
  • Online ISBN 978-3-642-25405-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349