The Tenth International Conference on Post-Quantum Cryptography
Chongqing University, Chongqing, May 8-10, 2019
Authors | Title |
Jan-Pieter D'Anvers, Frederik Vercauteren and Ingrid Verbauwhede | The impact of error dependencies on Ring/Mod-LWE/LWR based schemes |
Daniel Apon, Dana Dachman-Soled, Huijing Gong and Jonathan Katz | Constant-Round Group Key-Exchange from the Ring-LWE Assumption |
Sauvik Bhattacharya, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang, Hayo Baan and Scott Fluhrer | Round5: A Compact and Fast Post-Quantum Public-Key Cryptosystem |
Slim Bettaieb, Loïc Bidoux, Philippe Gaborit and Etienne Marcatel | Preventing timing attacks against RQC using constant time decoding of Gabidulin codes |
Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves and Douglas Stebila | Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange |
Pedro Branco and Paulo Mateus | A traceable ring signature scheme based on coding theor |
Alain Couvreur, Matthieu Lequesne and Jean-Pierre Tillich | Recovering short secret keys of RLCE in polynomial time |
Thomas Decru, Lorenz Panny and Frederik Vercauteren | Faster SeaSign signatures through improved rejection sampling |
Emmanouil Doulgerakis, Thijs Laarhoven and Benne de Weger | Finding closest lattice vectors using approximate Voronoi cells |
Farnoud Farahmand, Viet B. Dang, Duc Tri Nguyen and Kris Gaj | Evaluating the Potential for Hardware Acceleration of Four NTRU-Based Key Encapsulation Mechanisms Using Software/Hardware Codesign |
E.V. Flynn and Yan Bo Ti | Genus Two Isogeny Cryptography |
Ben Hamlin and Fang Song | Quantum security of hash functions and property-preservation of iterated hashing |
Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani and Keita Xagawa | Improved Quantum Multicollision-Finding Algorithm |
Haodong Jiang, Zhenfeng Zhang and Zhi Ma | Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle mode |
Qinyi Li and Xavier Boyen | Direct CCA2 KEM and Deterministic PKE from Standard LWE |
San Ling, Khoa Nguyen, Huaxiong Wang and Yanhong Xu | Forward-Secure Group Signatures from Lattices |
Zhen Liu, Yanbin Pan and Zhenfei Zhang | Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS’15 |
Michael Meyer, Fabio Campos and Steffen Reith | On Lions and Elligators: An efficient constant-time implementation of CSIDH |
Tobias Oder, Julian Speith, Kira Höltgen and Tim Güneysu | Towards Practical Microcontroller Implementation of the Signature Scheme Falcon |
Nicolas Sendrier and Valentin Vasseur | On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders |
Javier Verbel, John Baena, Daniel Cabarcas, Ray Perlner and Daniel Smith-Tone | On the Complexity of "Superdetermined" Minrank Instances |
Takashi Yamakawa and Keita Xagawa | (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model |