Fifth PQC Standardization Conference | CSRC (original) (raw)

Cryptanalysis of the SNOVA signature scheme
Peigen Li, Jintai Ding

Practical and Theoretical Cryptanalysis of VOX
Hao Guo, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding

A note on SPHINCS+ parameter sets
Stefan Kölbl, Jade Philpoom

Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Ward Beullens, Fabio Campos, Sofia Celi, Basil Hess, Matthias Kannwischer

The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections
Panos Kampanakis, Will Childs

SDitH in Hardware
Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue

Preliminary Cryptanalysis of the Biscuit Signature Scheme
Charles Bouillaguet, Julia Sauvage

pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers
Matthias Kannwischer, Markus Krausz, Richard Petri, Shang-Yi Yang

Novel Schoolbook-Originated Polynomial Multiplication Accelerators for NTRU-based PQC
Yazheng Tu, Shi Bai, Jinjun Xiong, Jiafeng Xie

Side Channel Resistant SPHINCS+
Scott Fluhrer

Efficacy and Mitigation of the Cryptanalysis on AIM
Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee

Migrating Some Legacy e-Governance Applications to Post-Quantum Cryptography
Petr Muzikant, Jan Willemson, Peeter Laud

Post-Quantum Signatures from Threshold Computation in the Head
Thibauld Feneuil, Matthieu Rivain

Single trace HQC shared key recovery with SASCA
Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau

Finding isomorphisms between trilinear forms, slightly faster
Anand Narayanan, Youming Qiao, Gang Tang

Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit
Markku-Juhani O. Saarinen

PQC Standardization A Vendor’s Perspective (This was submitted as a PPTX)
Lauren De Meyer, Mike Hamburg, Simon Hoerder, Qinglai Xiao, Victor Arribas, Begül Bilgin, Stuart Kincaid

How Multi-Recipient KEMs can help the Deployment of Post-Quantum Cryptography
Joël Alwen, Matthew Campagna, Dominik Hartmann, Shuichi Katsumata, Eike Kiltz, Jake Massimo, Marta Mularczyk, Guillermo Pascual Perez, Thomas Prest, Peter Schwabe

Threshold Raccoon
Rafael del Pino Thomas Espitau, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani Saarinen, Kaoru Takemure

A lean BIKE KEM design for ephemeral key agreement
Nir Drucker , Shay Gueron, Dusan Kostic

ANTRAG: Simplifying and Improving Falcon Without Compromising Security
Thomas Espitau, Jade Guiton, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, Alexandre Wallet

New security analysis for UOV-based signature candidates with small public key size
Yasuhiko Ikematsu, Hiroki Furue and Rika Akiyama

One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures -- Preliminary Report
Carsten Baum, Ward Beullens, Cyprien de Saint Guilhem, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl

Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes
Alessandro Annechini,Alessandro Barenghi, Gerardo Pelosi

Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
Ruize Wang, Kalle Ngo, Joel Gärtner, and Elena Dubrova

On the Practical cost of Grover for AES Key Recovery
Sarah D and Peter C from the UK National Cyber Security Centre

PANEL PROPOSAL: Rehashing Pre-Hashing
Burt Kaliski

PANEL PROPOSAL(s): NCCoE Migration to PQC Project
Bill Newhouse

The following paper was accepted, but the author is unable to attend the conference:
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions
Samuel Jaques