SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ASIACRYPT (26. : 2020 : Online) Advances in cryptology - ASIACRYPT 2020 ; Part 1
1. Verfasser: Feo, Luca De (VerfasserIn)
Weitere Verfasser: Kohel, David (VerfasserIn), Leroux, Antonin (VerfasserIn), Petit, Christophe (VerfasserIn), Wesolowski, Benjamin (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting 2020 Yang, Rupeng
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT) 2020 Guo, Chun
How to Build Optimally Secure PRFs Using Block Ciphers 2020 Cogliati, Benoît
Cryptanalysis of Masked Ciphers: A Not So Random ldea 2020 Beyne, Tim
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions 2020 Gutiérrez, Antonio Flórez
Public-Key Generation with Verifiable Randomness 2020 Blazy, Olivier
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors 2020 Cini, Valerio
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications 2020 Katsumata, Shuichi
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums 2020 Hu, Kai
Mind the Propagation of States: New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions 2020 Hu, Xichao
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption 2020 Mennink, Bart
On the Adaptive Security of MACs and PRFs 2020 Morgan, Andrew
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness 2020 Hosoyamada, Akinori
Security Reductions for White-Box Key-Storage in Mobile Payments 2020 Bock, Estuardo Alpirez
A Bit-Vector Differential Model for the Modular Addition by a Constant 2020 Azimi, Seyyed Arash
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation 2020 Wu, Yusai
SILVER — Statistical Independence and Leakage Verification 2020 Knichel, David
Side Channel Information Set Decoding Using Iterative Chunking: Plaintext Recovery from the “Classic McEliece” Hardware Reference Implementation 2020 Lahr, Norman
SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies 2020 Feo, Luca De
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security 2020 Libert, Benoît
Alle Artikel auflisten