04518nam 22006735 450 991059502850332120251225203750.09783031172342303117234510.1007/978-3-031-17234-2(CKB)5840000000091755(MiAaPQ)EBC7101936(Au-PeEL)EBL7101936(PPN)264953371(BIP)85811671(BIP)85408914(DE-He213)978-3-031-17234-2(EXLCZ)99584000000009175520220925d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPost-Quantum Cryptography 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings /edited by Jung Hee Cheon, Thomas Johansson1st ed. 2022.Cham :Springer International Publishing :Imprint: Springer,2022.1 online resource (523 pages)Lecture Notes in Computer Science,1611-3349 ;135129783031172335 3031172337 Code-Based Cryptography -- Hybrid Decoding - Classical-Quantum Trade-O s for Information Set Decoding -- How to Backdoor (Classic) McEliece and How to Guard Against Backdoors -- LRPC codes with multiple syndromes: near ideal-size KEMs without ideals -- Interleaved Prange: A New Generic Decoder for Interleaved Codes -- A Study of Error Floor Behavior in QC-MDPC Codes -- Multivariate Cryptography and the MinRank Problem -- Improvement of algebraic attacks for superdetermined MinRank -- A New Fault Attack on UOV Multivariate Signature Scheme -- MR-DSS - Smaller MinRank-based (Ring-)Signatures -- IPRainbow -- 2F - A New Method for Constructing E cient Multivariate Encryption Schemes -- Quantum Algorithms, Attacks and Models -- Quantum Attacks on Lai-Massey Structure -- Sponge-based Authenticated Encryption: Security against Quantum Attackers -- Post-quantum Plaintext-awareness -- On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP -- Implementation and Side channel attacks -- Effciently Masking Polynomial Inversion at Arbitrary Order -- A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem -- A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext -- Isogeny -- On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions -- Attack on SHealS and HealS: the Second Wave of GPST -- Post-Quantum Signal Key Agreement from SIDH -- Lattice-Based Cryptography -- Forward-Secure Revocable Secret Handshakes from Lattices -- Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm -- Cryptanalysis -- Breaking Category Five SPHINCS+ with SHA-256.This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. The papers are categorized in the following topical sub-headings: Code-Based Cryptography; Multivariate Cryptography and the MinRank Problem; Quantum Algorithims, Attacks and Models; Implementation and Side Channel Attacks; Isogeny; Lattice-based Cryptography; Cryptanalysis.Lecture Notes in Computer Science,1611-3349 ;13512CryptographyData encryption (Computer science)Application softwareComputer networksCryptologyComputer and Information Systems ApplicationsComputer Communication NetworksCryptography.Data encryption (Computer science).Application software.Computer networks.Cryptology.Computer and Information Systems Applications.Computer Communication Networks.005.8005.82Cheon Jung HeeJohansson ThomasMiAaPQMiAaPQMiAaPQBOOK9910595028503321Post-quantum cryptography230307UNINA