Explore the words cloud of the PQCRYPTO project. It provides you a very rough idea of what is the project "PQCRYPTO" about.
The following table provides information about the project.
Coordinator |
TECHNISCHE UNIVERSITEIT EINDHOVEN
Organization address contact info |
Coordinator Country | Netherlands [NL] |
Project website | https://pqcrypto.eu.org/ |
Total cost | 3˙964˙791 € |
EC max contribution | 3˙851˙791 € (97%) |
Programme |
1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)) |
Code Call | H2020-ICT-2014-1 |
Funding Scheme | RIA |
Starting year | 2015 |
Duration (year-month-day) | from 2015-03-01 to 2018-02-28 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | TECHNISCHE UNIVERSITEIT EINDHOVEN | NL (EINDHOVEN) | coordinator | 708˙958.00 |
2 | INSTITUT NATIONAL DE RECHERCHE ENINFORMATIQUE ET AUTOMATIQUE | FR (LE CHESNAY CEDEX) | participant | 463˙750.00 |
3 | DANMARKS TEKNISKE UNIVERSITET | DK (KGS LYNGBY) | participant | 383˙392.00 |
4 | KATHOLIEKE UNIVERSITEIT LEUVEN | BE (LEUVEN) | participant | 359˙375.00 |
5 | TECHNISCHE UNIVERSITAT DARMSTADT | DE (DARMSTADT) | participant | 358˙440.00 |
6 | STICHTING KATHOLIEKE UNIVERSITEIT | NL (NIJMEGEN) | participant | 352˙445.00 |
7 | UNIVERSITY OF HAIFA | IL (HAIFA) | participant | 343˙392.00 |
8 | RUHR-UNIVERSITAET BOCHUM | DE (BOCHUM) | participant | 342˙755.00 |
9 | NXP SEMICONDUCTORS BELGIUM NV | BE (LEUVEN) | participant | 321˙460.00 |
10 | BUNDESDRUCKEREI GMBH | DE (BERLIN) | participant | 217˙822.00 |
11 | ACADEMIA SINICA | TW (TAIPEI) | participant | 0.00 |
Online banking, e-commerce, telemedicine, mobile communication, and cloud computing depend fundamentally on the security of the underlying cryptographic algorithms. Public-key algorithms are particularly crucial since they provide digital signatures and establish secure communication without requiring in-person meetings.
Essentially all applications today are based on RSA or on the discrete-logarithm problem in finite fields or on elliptic curves. Cryptographers optimize parameter choices and implementation details for these systems and build protocols on top of these systems; cryptanalysts fine-tune attacks and establish exact security levels for these systems. Alternative systems are far less visible in research and unheard of in practice.
It might seem that having three systems offers enough variation, but these systems are all broken as soon as large quantum computers are built. The EU and governments around the world are investing heavily in building quantum computers; society needs to be prepared for the consequences, including cryptanalytic attacks accelerated by these computers. Long-term confidential documents such as patient health-care records and state secrets have to guarantee security for many years, but information encrypted today using RSA or elliptic curves and stored until quantum computers are available will then be as easy to decipher as Enigma-encrypted messages are today.
PQCRYPTO will allow users to switch to post-quantum cryptography: cryptographic systems that are not merely secure for today but that will also remain secure long-term against attacks by quantum computers. PQCRYPTO will design a portfolio of high-security post-quantum public-key systems, and will improve the speed of these systems, adapting to the different performance challenges of mobile devices, the cloud, and the Internet of Things. PQCRYPTO will provide efficient implementations of high-security post-quantum cryptography for a broad spectrum of real-world applications.
Small devices: Intermediate report on optimized hardware, | Documents, reports | 2019-06-19 17:51:08 |
Internet: Preliminary integration | Documents, reports | 2019-06-19 17:51:08 |
Standardization: Final report, | Documents, reports | 2019-06-19 17:51:08 |
Internet: Integration | Documents, reports | 2019-06-19 17:51:07 |
Management: second progress report | Documents, reports | 2019-06-19 17:51:08 |
Standardization: Preliminary report | Documents, reports | 2019-06-19 17:51:08 |
Cloud: Advanced applications | Documents, reports | 2019-06-19 17:51:07 |
Cloud: Security risks in secret-key cryptography | Documents, reports | 2019-06-19 17:51:08 |
Management: Project website and internal IT communication infrastructure | Other | 2019-06-19 17:51:08 |
Internet: Software library, | Other | 2019-06-19 17:51:07 |
Small devices: Intermediate report on physical attacks | Documents, reports | 2019-06-19 17:51:08 |
Small devices: Intermediate report on optimized software | Documents, reports | 2019-06-19 17:51:08 |
Cloud: Security risks in public-key cryptography | Documents, reports | 2019-06-19 17:51:07 |
Cloud: Long-term authenticated ciphers | Documents, reports | 2019-06-19 17:51:08 |
Cloud: Long-term public-key cryptography | Documents, reports | 2019-06-19 17:51:08 |
Small devices: Reference implementations | Other | 2019-06-19 17:51:08 |
Small devices: Final report | Documents, reports | 2019-06-19 17:51:08 |
Internet: Preliminary portfolio | Documents, reports | 2019-06-19 17:51:08 |
Management: first progeess report year 1 | Documents, reports | 2019-06-19 17:51:08 |
Management: Data management plan | Documents, reports | 2019-06-19 17:51:07 |
Small devices: Final implementations | Other | 2019-06-19 17:51:08 |
Small devices: Intermediate report on algorithms | Documents, reports | 2019-06-19 17:51:08 |
Internet: Portfolio | Documents, reports | 2019-06-19 17:51:07 |
Take a look to the deliverables list in detail: detailed list of PQCRYPTO deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2017 |
Nina Bindel, Johannes Buchmann, Susanne Rieß Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols published pages: , ISSN: 1615-5262, DOI: 10.1007/s10207-017-0397-6 |
International Journal of Information Security | 2019-06-19 |
2018 |
Daniel Augot, Pierre Loidreau, Gwezheneg Robert Generalized Gabidulin codes over fields of any characteristic published pages: 1807-1848, ISSN: 0925-1022, DOI: 10.1007/s10623-017-0425-6 |
Designs, Codes and Cryptography 86/8 | 2019-06-19 |
2017 |
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom Sliding Right into Disaster: Left-to-Right Sliding Windows Leak published pages: 555-576, ISSN: , DOI: 10.1007/978-3-319-66787-4_27 |
CHES 2017 | 2019-06-19 |
2017 |
Nir Drucker, Shay Gueron, Benny Pinkas Faster Secure Cloud Computations with a Trusted Proxy published pages: 61-67, ISSN: 1540-7993, DOI: 10.1109/MSP.2017.4251121 |
IEEE Security & Privacy 15/6 | 2019-06-19 |
2018 |
Leon Groot Bruinderink, Andreas Hülsing \"\"\"Oops, I did it again\"\" - Security of One-Time Signatures under Two-Message Attacks\" published pages: 299-322, ISSN: , DOI: 10.1007/978-3-319-72565-9_15 |
SAC 2017 | 2019-06-19 |
2018 |
Shoni Gilboa, Shay Gueron, Ben Morris How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function? published pages: 162-171, ISSN: 0933-2790, DOI: 10.1007/s00145-017-9253-0 |
Journal of Cryptology 31/1 | 2019-06-19 |
2018 |
Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme published pages: , ISSN: 2569-2925, DOI: 10.13154/tches.v2018.i1.238-268 |
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2019-06-19 |
2019 |
Tobias Oder and Tim Güneysu Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs. published pages: , ISSN: , DOI: |
Latincrypt to appear | 2019-06-19 |
2018 |
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, MarÃa Naya-Plasencia, Pascal Paillier, Renaud Sirdey Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression published pages: 885-916, ISSN: 0933-2790, DOI: 10.1007/s00145-017-9273-9 |
Journal of Cryptology 31/3 | 2019-06-19 |
2018 |
Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier QC-MDPC: A Timing Attack and a CCA2 KEM published pages: 47-76, ISSN: , DOI: 10.1007/978-3-319-79063-3_3 |
PQCrypto 2018 | 2019-06-19 |
2018 |
Stoffelen, Ko; Daemen, Joan Column Parity Mixers published pages: 126-159, ISSN: 2519-173X, DOI: 10.13154/tosc.v2018.i1.126-159 |
IACR Transactions on Symmetric Cryptology 1 | 2019-06-19 |
2017 |
Kranz, Thorsten; Leander, Gregor; Stoffelen, Ko; Wiemer, Friedrich Shorter Linear Straight-Line Programs for MDS Matrices published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i4.188-211 |
IACR Transactions on Symmetric Cryptology 4 | 2019-06-19 |
2017 |
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich Polynomial Time Attack on Wild McEliece Over Quadratic Extensions published pages: 404-427, ISSN: 0018-9448, DOI: 10.1109/TIT.2016.2574841 |
IEEE Transactions on Information Theory 63/1 | 2019-06-19 |
2016 |
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe Post-quantum Key Exchange -- A New Hope published pages: , ISSN: , DOI: |
25th USENIX Security Symposium (USENIX Security 16) | 2019-06-19 |
2016 |
Kölbl, Stefan; Lauridsen, Martin M.; Mendel, Florian; Rechberger, Christian Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2016.i2.1-29 |
IACR Transactions on Symmetric Cryptology 5 | 2019-06-19 |
2016 |
Gilboa, Shoni; Gueron, Shay The Advantage of Truncated Permutations published pages: , ISSN: , DOI: |
2019-06-19 | |
2016 |
Kaplan, Marc; Leurent, Gaëtan; Leverrier, Anthony; Naya-Plasencia, MarÃa Quantum Differential and Linear Cryptanalysis published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2016.i1.71-94 |
IACR Transactions on Symmetric Cryptology 9 | 2019-06-19 |
2016 |
Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret, Frederic de Portzamparc, Jean-Pierre Tillich Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups published pages: 184-198, ISSN: 0018-9448, DOI: 10.1109/TIT.2015.2493539 |
IEEE Transactions on Information Theory 62/1 | 2019-06-19 |
2017 |
Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta Post-quantum RSA. published pages: 311-329, ISSN: , DOI: 10.1007/978-3-319-59879-6_18 |
PQCrypto 2017 | 2019-06-19 |
2017 |
Gustavo Banegas, Daniel J. Bernstein Low-Communication Parallel Quantum Multi-Target Preimage Search published pages: 325-335, ISSN: , DOI: 10.1007/978-3-319-72565-9_16 |
SAC 2017 | 2019-06-19 |
2017 |
Ghazal Kachigar, Jean-Pierre Tillich Quantum Information Set Decoding Algorithms published pages: 69-89, ISSN: , DOI: 10.1007/978-3-319-59879-6_5 |
PQCrypto 2017 | 2019-06-19 |
2016 |
Shay Gueron, Vlad Krasnov Fast Quicksort Implementation Using AVX Instructions published pages: bxv063, ISSN: 0010-4620, DOI: 10.1093/comjnl/bxv063 |
The Computer Journal | 2019-06-19 |
2016 |
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation published pages: 44-60, ISSN: , DOI: 10.1007/978-3-319-31517-1_3 |
Africacrypt 2016 | 2019-06-19 |
2018 |
Robin Kwant, Tanja Lange, Kimberley Thissen Lattice Klepto: turning post-quantum crypto against itself published pages: 336-354, ISSN: , DOI: 10.1007/978-3-319-72565-9_17 |
SAC 2017 | 2019-06-19 |
2018 |
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh Post-quantum security of the sponge construction.. Post-Quantum Cryptography. published pages: 185-204, ISSN: , DOI: 10.1007/978-3-319-79063-3_9 |
PQCrypto 2018 | 2019-06-19 |
2018 |
Daniel J. Bernstein, Bo-Yin Yang Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations published pages: 487-506, ISSN: , DOI: 10.1007/978-3-319-79063-3_23 |
PQCrypto 2018 | 2019-06-19 |
2016 |
Shay Gueron, Nicky Mouha Simpira v2: A Family of Efficient Permutations Using the AES Round Function published pages: 95-125, ISSN: , DOI: 10.1007/978-3-662-53887-6_4 |
ASIACRYPT 2016: Advances in Cryptology | 2019-06-19 |
2016 |
Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack published pages: 24-43, ISSN: , DOI: 10.1007/978-3-319-31517-1_2 |
Africacrypt 2016 | 2019-06-19 |
2017 |
Daniel J. Bernstein, Jean-François Biasse, Michele Mosca A Low-Resource Quantum Factoring Algorithm published pages: 330-346, ISSN: , DOI: 10.1007/978-3-319-59879-6_19 |
PQCrypto 2017 | 2019-06-19 |
2017 |
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir Memory-Efficient Algorithms for Finding Needles in Haystacks. published pages: 185-206, ISSN: , DOI: 10.1007/978-3-662-53008-5_7 |
Crypto 2017 | 2019-06-19 |
2016 |
Shay Gueron Memory Encryption for General-Purpose Processors published pages: 54-62, ISSN: 1540-7993, DOI: 10.1109/MSP.2016.124 |
IEEE Security & Privacy 14/6 | 2019-06-19 |
2017 |
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier Gimli: a cross-platform permutation published pages: 299-320, ISSN: , DOI: 10.1007/978-3-319-66787-4_15 |
CHES 2017 | 2019-06-19 |
2017 |
Andreas Hülsing, Joost Rijneveld, John Schanck, Peter Schwabe High-speed key encapsulation from NTRU. published pages: 232-252, ISSN: , DOI: 10.1007/978-3-319-66787-4_12 |
CHES 2017 | 2019-06-19 |
2016 |
Stoffelen, K. Instruction Scheduling and Register Allocation on ARM Cortex-M published pages: , ISSN: , DOI: |
SPEED-B - Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, 1 - 9. [S.l. : s.n.] | 2019-06-19 |
2018 |
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe SOFIA: MQ-based signatures in the QROM published pages: 3-33, ISSN: , DOI: 10.1007/978-3-319-76581-5_1 |
PKC 2018 | 2019-06-19 |
2016 |
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem published pages: 1093-1105, ISSN: 1556-6013, DOI: 10.1109/TIFS.2015.2509944 |
IEEE Transactions on Information Forensics and Security 11/6 | 2019-06-19 |
2016 |
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich Structural cryptanalysis of McEliece schemes with compact keys published pages: 87-112, ISSN: 0925-1022, DOI: 10.1007/s10623-015-0036-z |
Designs, Codes and Cryptography 79/1 | 2019-06-19 |
2017 |
Alain Couvreur, Irene Marquez-Corbella, Ruud Pellikaan Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes published pages: 5404-5418, ISSN: 0018-9448, DOI: 10.1109/TIT.2017.2712636 |
IEEE Transactions on Information Theory 63/8 | 2019-06-19 |
2017 |
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal Short generators without quantum computers: the case of multiquadratics published pages: 27-59, ISSN: , DOI: 10.1007/978-3-319-56620-7_2 |
Eurocrypt 2017 | 2019-06-19 |
2018 |
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal NTRU prime: reducing attack surface at low cost published pages: 235-260, ISSN: , DOI: 10.1007/978-3-319-72565-9_12 |
SAC 2017 | 2019-06-19 |
2018 |
Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu Practical CCA2-Secure and Masked Ring-LWE Implementation published pages: , ISSN: 2569-2925, DOI: 10.13154/tches.v2018.i1.142-174 |
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2019-06-19 |
2017 |
Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics published pages: 225-241, ISSN: , DOI: 10.1007/978-3-319-75650-9_15 |
Foundations and Practice of Security | 2019-06-19 |
2017 |
Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer Revisiting the Expected Cost of Solving uSVP and Applications to LWE published pages: 297-322, ISSN: , DOI: 10.1007/978-3-319-70694-8_11 |
Asiacrypt 2017 | 2019-06-19 |
2017 |
Bardet , Magali; Barelli , Elise; Blazy , Olivier; Canto Torres , Rodolfo; Couvreur , Alain; Gaborit , Philippe; Otmani , Ayoub; Sendrier , Nicolas; Tillich , Jean-Pierre BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation published pages: , ISSN: , DOI: |
submission to the NIST post quantum cryptography standardization process. 2017 | 2019-06-19 |
2017 |
Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich Identity-Based Encryption from Codes with Rank Metric published pages: 194-224, ISSN: , DOI: 10.1007/978-3-319-63697-9_7 |
CRYPTO 2017: Advances in Cryptology | 2019-06-19 |
2016 |
Sébastien Duval, Virginie Lallemand, Yann Rotella Cryptanalysis of the FLIP Family of Stream Ciphers published pages: 457-475, ISSN: , DOI: 10.1007/978-3-662-53018-4_17 |
CRYPTO 2016: Advances in Cryptology | 2019-06-19 |
2017 |
Aragon , Nicolas; Barreto , Paulo ,; Bettaieb , Slim; Bidoux , Loïc; Blazy , Olivier; Deneuville , Jean-Christophe; Gaborit , Philippe; Gueron , Shay; Guneysu , Tim; Aguilar Melchor , Carlos; Misoczki , Rafael; Persichetti , Edoardo; Sendrier , Nicolas; Tillich , Jean-Pierre; Zémor , Gilles BIKE: Bit Flipping Key Encapsulation published pages: , ISSN: , DOI: |
https://hal.archives-ouvertes.fr/hal-01671903 | 2019-06-19 |
2016 |
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren On error distributions in ring-based LWE published pages: 130-145, ISSN: 1461-1570, DOI: 10.1112/S1461157016000280 |
LMS Journal of Computation and Mathematics 19/A | 2019-06-19 |
2017 |
Mohamed Saied Emam Mohamed, Albrecht Petzoldt RingRainbow - An Efficient Multivariate Ring Signature Scheme published pages: 3-20, ISSN: , DOI: 10.1007/978-3-319-57339-7_1 |
Africacrypt 2017 | 2019-06-19 |
2018 |
Daniel J. Bernstein Is the security of quantum cryptography guaranteed by the laws of physics? published pages: , ISSN: , DOI: |
quant-ph arXiv 1803.0452 | 2019-06-19 |
2017 |
Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega Revisiting TESLA in the quantum random oracle model published pages: 143-162, ISSN: , DOI: 10.1007/978-3-319-59879-6_9 |
PQCrypto 2017 | 2019-06-19 |
2017 |
Patrick Holzer, Thomas Wunderer, Johannes A. Buchmann Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α * q^β published pages: 346-368, ISSN: , DOI: 10.1007/978-3-319-71667-1_18 |
Indocrypt 2017 | 2019-06-19 |
2016 |
Peter Schwabe, Bas Westerbaan Solving binary MQ with Grover\'s algorithm published pages: 303-322, ISSN: , DOI: 10.1007/978-3-319-49445-6_17 |
SPACE 2016 | 2019-06-19 |
2018 |
Stefan Kölbl Putting Wings on SPHINCS published pages: 205-226, ISSN: , DOI: 10.1007/978-3-319-79063-3_10 |
PQCrypto 2018 | 2019-06-19 |
2017 |
Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich CAKE: Code-based Algorithm for Key Encapsulation published pages: 207-226, ISSN: , DOI: 10.1007/978-3-319-71045-7_11 |
16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings | 2019-06-19 |
2017 |
Tomer Ashur, Orr Dunkelman, Atul Luykx Boosting Authenticated Encryption Robustness with Minimal Modifications published pages: 3-33, ISSN: , DOI: 10.1007/978-3-319-63697-9_1 |
CRYPTO 2017 | 2019-06-19 |
2018 |
A. Huelsing
D. Butin
S. Gazdag
J. Rijneveld
A. Mohaisen XMSS: eXtended Merkle Signature Scheme published pages: , ISSN: , DOI: 10.17487/RFC8391 |
RFC 8391 | 2019-06-19 |
2016 |
Oscar Reparaz, Sujoy Sinha Roy, Ruan de Clercq, Frederik Vercauteren, Ingrid Verbauwhede Masking ring-LWE published pages: 139-153, ISSN: 2190-8508, DOI: 10.1007/s13389-016-0126-5 |
Journal of Cryptographic Engineering 6/2 | 2019-06-19 |
2017 |
Ashur, Tomer; Bar-On, Achiya; Dunkelman, Orr Cryptanalysis of GOST2 published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.203-214 |
IACR Transactions on Symmetric Cryptology 8 | 2019-06-19 |
2017 |
Dan Boneh, Shay Gueron Surnaming Schemes, Fast Verification, and Applications to SGX Technology published pages: 149-164, ISSN: , DOI: 10.1007/978-3-319-52153-4_9 |
CT-RSA 2017 | 2019-06-19 |
2017 |
Florian Göpfert, Christine van Vredendaal, Thomas Wunderer A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE published pages: 184-202, ISSN: , DOI: 10.1007/978-3-319-59879-6_11 |
PQCrypto 2017 | 2019-06-19 |
2018 |
Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller Efficient Slide Attacks published pages: 641-670, ISSN: 0933-2790, DOI: 10.1007/s00145-017-9266-8 |
Journal of Cryptology 31/3 | 2019-06-19 |
2018 |
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction published pages: 203-216, ISSN: , DOI: 10.1007/978-3-319-89339-6_12 |
AFRICACRYPT 2018 | 2019-06-19 |
2015 |
Ingo Von Maurich, Tobias Oder, Tim Güneysu Implementing QC-MDPC McEliece Encryption published pages: 1-27, ISSN: 1539-9087, DOI: 10.1145/2700102 |
ACM Transactions on Embedded Computing Systems 14/3 | 2019-06-19 |
2018 |
Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann Differential Power Analysis of XMSS and SPHINCS published pages: 168-188, ISSN: , DOI: 10.1007/978-3-319-89641-0_10 |
COSADE 2018 | 2019-06-19 |
2017 |
Bart Mennink, Alan Szepieniec XOR of PRPs in a Quantum World published pages: 367-383, ISSN: , DOI: 10.1007/978-3-319-59879-6_21 |
PQCrypto 2017 | 2019-06-19 |
2017 |
André Chailloux, MarÃa Naya-Plasencia, André Schrottenloher An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography published pages: 211-240, ISSN: , DOI: 10.1007/978-3-319-70697-9_8 |
Asiacrypt 2017 | 2019-06-19 |
2016 |
Ashur, Tomer; Dunkelman, Orr; Talmon, Nimrod Breaching the Privacy of Israel\'s Paper Ballot Voting System published pages: , ISSN: 0302-9743, DOI: |
Lecture Notes in Computer Science 6 | 2019-06-19 |
2018 |
Andreas Hülsing, Tanja Lange, Kit Smeets Rounded Gaussians published pages: 728-757, ISSN: , DOI: 10.1007/978-3-319-76581-5_25 |
PKC 2018 | 2019-06-19 |
2017 |
Yves Aubry, Wouter Castryck, Sudhir R. Ghorpade, Gilles Lachaud, Michael E. O’Sullivan, Samrith Ram Hypersurfaces in Weighted Projective Spaces Over Finite Fields with Applications to Coding Theory published pages: 25-61, ISSN: , DOI: 10.1007/978-3-319-63931-4_2 |
Algebraic Geometry for Coding Theory and Cryptography | 2019-06-19 |
2017 |
Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed A Practical Multivariate Blind Signature Scheme published pages: 437-454, ISSN: , DOI: 10.1007/978-3-319-70972-7_25 |
Financial Cryptography and Data Security 2017 | 2019-06-19 |
2017 |
Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila Transitioning to a Quantum-Resistant Public Key Infrastructure published pages: 384-405, ISSN: , DOI: 10.1007/978-3-319-59879-6_22 |
PQCrypto 2017 | 2019-06-19 |
2018 |
Tillich, Jean-Pierre The decoding failure probability of MDPC codes published pages: , ISSN: , DOI: |
2019-06-19 | |
2015 |
Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware published pages: 1954-1967, ISSN: 0018-9340, DOI: 10.1109/TC.2014.2346177 |
IEEE Transactions on Computers 64/7 | 2019-06-19 |
2017 |
Erick Nascimento, Åukasz Chmielewski, David Oswald, Peter Schwabe Attacking Embedded ECC Implementations Through cmov Side Channels published pages: 99-119, ISSN: , DOI: 10.1007/978-3-319-69453-5_6 |
SAC 2016 | 2019-06-19 |
2017 |
Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers published pages: 1-24, ISSN: 1539-9087, DOI: 10.1145/3092951 |
ACM Transactions on Embedded Computing Systems 16/4 | 2019-06-19 |
2019 |
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies published pages: , ISSN: , DOI: |
Eurocrypt 2019, lecture notes in computer science | 2019-06-19 |
2018 |
Daniel J. Bernstein and Edoardo Persichetti Towards KEM Unification published pages: , ISSN: , DOI: |
IACR ePrint archive 2018/526 | 2019-06-19 |
2018 |
Steven D. Galbraith, Frederik Vercauteren Computational problems in supersingular elliptic curve isogenies published pages: , ISSN: 1570-0755, DOI: 10.1007/s11128-018-2023-6 |
Quantum Information Processing 17/10 | 2019-06-19 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "PQCRYPTO" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "PQCRYPTO" are provided by the European Opendata Portal: CORDIS opendata.