Post-Quantum Cryptography

8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings

  • Tanja Lange
  • Tsuyoshi Takagi

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10346)

Also part of the Security and Cryptology book sub series (LNSC, volume 10346)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Code-Based Cryptography

    1. Front Matter
      Pages 1-1
    2. Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor
      Pages 18-34
    3. Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka
      Pages 35-50
    4. Tomáš Fabšič, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson
      Pages 51-68
    5. Ghazal Kachigar, Jean-Pierre Tillich
      Pages 69-89
  3. Isogeny-Based Cryptography

    1. Front Matter
      Pages 91-91
    2. Alexandre Gélin, Benjamin Wesolowski
      Pages 93-106
  4. Lattice-Based Cryptography

    1. Front Matter
      Pages 123-123
    2. Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque, Paul Kirchner
      Pages 125-142
    3. Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski et al.
      Pages 143-162
    4. Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
      Pages 184-202
  5. Multivariate Cryptography

    1. Front Matter
      Pages 203-203
    2. Albrecht Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang
      Pages 205-223
    3. Alan Szepieniec, Ward Beullens, Bart Preneel
      Pages 224-240
    4. Ryann Cartor, Daniel Smith-Tone
      Pages 241-254

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017.

The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.

Keywords

coding theory cryptanalysis and other attacks cryptographic primitives cryptographic protocols cryptography cryptosystems digital signature schemes encryption encryption schemes key management mathematical foundations of cryptography post-quantum cryptography public key (asymmetric) techniques quantum computation theory quantum computing random oracle model security

Editors and affiliations

  • Tanja Lange
    • 1
  • Tsuyoshi Takagi
    • 2
  1. 1.Technische Universiteit EindhovenEindhovenThe Netherlands
  2. 2.Kyushu University FukuokaJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-59879-6
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-59878-9
  • Online ISBN 978-3-319-59879-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book