Abstract is missing.
- Sealing the Leak on Classical NTRU SignaturesCarlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit. 1-21 [doi]
- On the Efficiency of Provably Secure NTRUDaniel Cabarcas, Patrick Weiden, Johannes Buchmann. 22-39 [doi]
- A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd CharacteristicsChen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi. 40-58 [doi]
- Differential Properties of the HFE CryptosystemTaylor Daniels, Daniel Smith-Tone. 59-75 [doi]
- The Cubic Simple Matrix Encryption SchemeJintai Ding, Albrecht Petzoldt, Lih-Chung Wang. 76-87 [doi]
- RankSign: An Efficient Signature Algorithm Based on the Rank MetricPhilippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor. 88-107 [doi]
- Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013Yasufumi Hashimoto. 108-125 [doi]
- Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose HardwareStefan Heyse, Ralf Zimmermann 0001, Christof Paar. 126-141 [doi]
- Transcript Secure Signatures Based on Modular LatticesJeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte. 142-159 [doi]
- Isogeny-Based Quantum-Resistant Undeniable SignaturesDavid Jao, Vladimir Soukharev. 160-179 [doi]
- An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption SchemeDustin Moody, Ray A. Perlner, Daniel Smith-Tone. 180-196 [doi]
- Lattice Cryptography for the InternetChris Peikert. 197-219 [doi]
- Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC CodesRay A. Perlner. 220-228 [doi]
- ZHFE, a New Multivariate Public Key Encryption SchemeJaiberth Porras, John Baena, Jintai Ding. 229-245 [doi]
- A Note on Quantum Security for Post-Quantum CryptographyFang Song 0001. 246-265 [doi]
- Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained DevicesIngo von Maurich, Tim Güneysu. 266-282 [doi]