Abstract is missing.
- Finding Closest Lattice Vectors Using Approximate Voronoi CellsEmmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger. 3-22 [doi]
- Evaluating the Potential for Hardware Acceleration of Four NTRU-Based Key Encapsulation Mechanisms Using Software/Hardware CodesignFarnoud Farahmand, Viet B. Dang, Duc Tri Nguyen, Kris Gaj. 23-43 [doi]
- Forward-Secure Group Signatures from LatticesSan Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu. 44-64 [doi]
- Towards Practical Microcontroller Implementation of the Signature Scheme FalconTobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu. 65-80 [doi]
- Round5: Compact and Fast Post-quantum Public-Key EncryptionHayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang. 83-102 [doi]
- The Impact of Error Dependencies on Ring/Mod-LWE/LWR Based SchemesJan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede. 103-115 [doi]
- Direct CCA-Secure KEM and Deterministic PKE from Plain LWEXavier Boyen, Qinyi Li. 116-130 [doi]
- Recovering Short Secret Keys of RLCE in Polynomial TimeAlain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich. 133-152 [doi]
- Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15Zhen Liu, Yanbin Pan, Zhenfei Zhang. 153-166 [doi]
- On the Complexity of "Superdetermined" Minrank InstancesJavier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone. 167-186 [doi]
- Constant-Round Group Key Exchange from the Ring-LWE AssumptionDaniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz. 189-205 [doi]
- Hybrid Key Encapsulation Mechanisms and Authenticated Key ExchangeNina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila. 206-226 [doi]
- Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle ModelHaodong Jiang, Zhenfeng Zhang, Zhi Ma. 227-248 [doi]
- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle ModelKeita Xagawa, Takashi Yamakawa. 249-268 [doi]
- Faster SeaSign Signatures Through Improved Rejection SamplingThomas Decru, Lorenz Panny, Frederik Vercauteren. 271-285 [doi]
- Genus Two Isogeny CryptographyE. Victor Flynn, Yan Bo Ti. 286-306 [doi]
- On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDHMichael Meyer, Fabio Campos, Steffen Reith. 307-325 [doi]
- Quantum Security of Hash Functions and Property-Preservation of Iterated HashingBen Hamlin, Fang Song 0001. 329-349 [doi]
- Improved Quantum Multicollision-Finding AlgorithmAkinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa. 350-367 [doi]
- Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin CodesSlim Bettaieb, Loïc Bidoux, Philippe Gaborit, Etienne Marcatel. 371-386 [doi]
- A Traceable Ring Signature Scheme Based on Coding TheoryPedro Branco 0005, Paulo Mateus. 387-403 [doi]
- On the Decoding Failure Rate of QC-MDPC Bit-Flipping DecodersNicolas Sendrier, Valentin Vasseur. 404-416 [doi]