Abstract is missing.
- A New Efficient Threshold Ring Signature Scheme Based on Coding TheoryCarlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit. 1-16 [doi]
- Square-Vinegar Signature SchemeJohn Baena, Crystal Clough, Jintai Ding. 17-30 [doi]
- Attacking and Defending the McEliece CryptosystemDaniel J. Bernstein, Tanja Lange, Christiane Peters. 31-46 [doi]
- McEliece Cryptosystem Implementation: Theory and PracticeBhaskar Biswas, Nicolas Sendrier. 47-62 [doi]
- Merkle Tree Traversal RevisitedJohannes Buchmann, Erik Dahmen, Michael Schneider. 63-78 [doi]
- Explicit Hard Instances of the Shortest Vector ProblemJohannes Buchmann, Richard Lindner, Markus Rückert. 79-94 [doi]
- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-DerivativesAnna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang. 95-108 [doi]
- Digital Signatures Out of Second-Preimage Resistant Hash FunctionsErik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume. 109-123 [doi]
- Cryptanalysis of Rational Multivariate Public Key CryptosystemsJintai Ding, John Wagner. 124-136 [doi]
- Syndrome Based Collision Resistant HashingMatthieu Finiasz. 137-147 [doi]
- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsRyou Fujita, Kohtaro Tadaki, Shigeo Tsujii. 148-164 [doi]
- On the Power of Quantum Encryption KeysAkinori Kawachi, Christopher Portmann. 165-180 [doi]
- Secure PRNGs from Specialized Polynomial Maps over Any Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang. 181-202 [doi]
- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant StrategyMohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann. 203-215 [doi]
- Side Channels in the McEliece PKCFalko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan. 216-229 [doi]