Home » Program » Accepted papers

Accepted papers

Dates

DEADLINES
Cut off for Delta Hotel negotiated rate: Sep 5, 2014
Summer School registration: Sep 5, 2014
Conference early registration: Sep 5, 2014
Conference
Date: Oct. 1-3, 2014

Venue

University of Waterloo
Waterloo, Ontario

PQCrypto 2014 accepted papers

Sealing the Leak on Classical NTRU Signatures
Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville and Philippe Gaborit

On the Efficiency of Provably Secure NTRU
Daniel Cabarcas, Patrick Weiden and Johannes Buchmann

A Polynomial-time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics
Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura and Tsuyoshi Takagi

Differential Properties of the HFE Cryptosystem
Taylor Daniels and Daniel Smith-Tone

The Cubic Simple Matrix Encryption Scheme
Jintai Ding, Albrecht Petzoldt and Lih-chung Wang

RankSign: An Efficient Signature Algorithm Based on the Rank Metric
Philippe Gaborit, Olivier Ruatta, Julien Schrek and Gilles Zémor

Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013
Yasufumi Hashimoto

Attacking Code-Based Cryptosystems with Information Set Decoding using Special-Purpose Hardware
Stefan Heyse, Ralf Zimmermann and Christof Paar

Transcript Secure Signatures Based on Modular Lattices
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H.  Silverman and William Whyte

Isogeny-Based Quantum-Resistant undeniable Signatures
David Jao and Vladimir Soukharev

An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Dustin Moody, Ray Perlner and Daniel Smith-Tone

Lattice Cryptography for the Internet
Chris Peikert

Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
Ray Perlner

ZHFE, a New Multivariate Public Key Encryption Scheme
Jaiberth Porras, John Baena and Jintai Ding

A Note on Quantum Security for Post-Quantum Cryptography
Fang Song

Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices
Ingo von Maurich and Tim Güneysu