Fifth PQC Standardization Conference | CSRC (original) (raw)
Cryptanalysis of the SNOVA signature scheme
Peigen Li, Jintai Ding
Practical and Theoretical Cryptanalysis of VOX
Hao Guo, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding
A note on SPHINCS+ parameter sets
Stefan Kölbl, Jade Philpoom
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Ward Beullens, Fabio Campos, Sofia Celi, Basil Hess, Matthias Kannwischer
The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections
Panos Kampanakis, Will Childs
SDitH in Hardware
Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue
Preliminary Cryptanalysis of the Biscuit Signature Scheme
Charles Bouillaguet, Julia Sauvage
pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers
Matthias Kannwischer, Markus Krausz, Richard Petri, Shang-Yi Yang
Novel Schoolbook-Originated Polynomial Multiplication Accelerators for NTRU-based PQC
Yazheng Tu, Shi Bai, Jinjun Xiong, Jiafeng Xie
Side Channel Resistant SPHINCS+
Scott Fluhrer
Efficacy and Mitigation of the Cryptanalysis on AIM
Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee
Migrating Some Legacy e-Governance Applications to Post-Quantum Cryptography
Petr Muzikant, Jan Willemson, Peeter Laud
Post-Quantum Signatures from Threshold Computation in the Head
Thibauld Feneuil, Matthieu Rivain
Single trace HQC shared key recovery with SASCA
Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau
Finding isomorphisms between trilinear forms, slightly faster
Anand Narayanan, Youming Qiao, Gang Tang
Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit
Markku-Juhani O. Saarinen
PQC Standardization A Vendor’s Perspective (This was submitted as a PPTX)
Lauren De Meyer, Mike Hamburg, Simon Hoerder, Qinglai Xiao, Victor Arribas, Begül Bilgin, Stuart Kincaid
How Multi-Recipient KEMs can help the Deployment of Post-Quantum Cryptography
Joël Alwen, Matthew Campagna, Dominik Hartmann, Shuichi Katsumata, Eike Kiltz, Jake Massimo, Marta Mularczyk, Guillermo Pascual Perez, Thomas Prest, Peter Schwabe
Threshold Raccoon
Rafael del Pino Thomas Espitau, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani Saarinen, Kaoru Takemure
A lean BIKE KEM design for ephemeral key agreement
Nir Drucker , Shay Gueron, Dusan Kostic
ANTRAG: Simplifying and Improving Falcon Without Compromising Security
Thomas Espitau, Jade Guiton, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, Alexandre Wallet
New security analysis for UOV-based signature candidates with small public key size
Yasuhiko Ikematsu, Hiroki Furue and Rika Akiyama
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures -- Preliminary Report
Carsten Baum, Ward Beullens, Cyprien de Saint Guilhem, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes
Alessandro Annechini,Alessandro Barenghi, Gerardo Pelosi
Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
Ruize Wang, Kalle Ngo, Joel Gärtner, and Elena Dubrova
On the Practical cost of Grover for AES Key Recovery
Sarah D and Peter C from the UK National Cyber Security Centre
PANEL PROPOSAL: Rehashing Pre-Hashing
Burt Kaliski
PANEL PROPOSAL(s): NCCoE Migration to PQC Project
Bill Newhouse
The following paper was accepted, but the author is unable to attend the conference:
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions
Samuel Jaques