Post-Quantum Cryptography

5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings

Editors:

ISBN: 978-3-642-38615-2 (Print) 978-3-642-38616-9 (Online)

Table of contents (17 chapters)

  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-15

    Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

  3. No Access

    Book Chapter

    Pages 16-33

    Quantum Algorithms for the Subset-Sum Problem

  4. No Access

    Book Chapter

    Pages 34-51

    Improved Lattice-Based Threshold Ring Signature Scheme

  5. No Access

    Book Chapter

    Pages 52-66

    Degree of Regularity for HFEv and HFEv-

  6. No Access

    Book Chapter

    Pages 67-82

    Software Speed Records for Lattice-Based Signatures

  7. No Access

    Book Chapter

    Pages 83-101

    Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search

  8. No Access

    Book Chapter

    Pages 102-117

    An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes

  9. No Access

    Book Chapter

    Pages 118-135

    Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations

  10. No Access

    Book Chapter

    Pages 136-154

    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

  11. No Access

    Book Chapter

    Pages 155-164

    Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme

  12. No Access

    Book Chapter

    Pages 165-173

    A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems

  13. No Access

    Book Chapter

    Pages 174-187

    Secure and Anonymous Hybrid Encryption from Coding Theory

  14. No Access

    Book Chapter

    Pages 188-202

    Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes

  15. No Access

    Book Chapter

    Pages 203-216

    The Hardness of Code Equivalence over $\mathbb{F}_q$ and Its Application to Code-Based Cryptography

  16. No Access

    Book Chapter

    Pages 217-230

    Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems

  17. No Access

    Book Chapter

    Pages 231-242

    Simple Matrix Scheme for Encryption

  18. No Access

    Book Chapter

    Pages 243-258

    Multivariate Signature Scheme Using Quadratic Forms

  19. Back Matter

    Pages -