Post-quantum cryptography: state of the art

JA Buchmann, D Butin, F Göpfert, A Petzoldt - … Kahn on the Occasion of His …, 2016 - Springer
Public-key cryptography is indispensable for cyber security. However, as a result of Peter
Shor shows, the public-key schemes that are being used today will become insecure once …

Oil and vinegar: Modern parameters and implementations

W Beullens, MS Chen, SH Hung… - IACR Transactions on …, 2023 - tches.iacr.org
Two multivariate digital signature schemes, Rainbow and GeMSS, made it into the third
round of the NIST PQC competition. However, neither made its way to being a standard due …

Design principles for HFEv-based multivariate signature schemes

A Petzoldt, MS Chen, BY Yang, C Tao… - Advances in Cryptology …, 2015 - Springer
Abstract The Hidden Field Equations (HFE) Cryptosystem as proposed by Patarin is one of
the best known and most studied multivariate schemes. While the security of the basic …

Current state of multivariate cryptography

J Ding, A Petzoldt - IEEE Security & Privacy, 2017 - ieeexplore.ieee.org
Current State of Multivariate Cryptography Page 1 28 July/August 2017 Copublished by the
IEEE Computer and Reliability Societies 1540-7993/17/$33.00 © 2017 IEEE POSTQUANTUM …

Transitioning to a quantum-resistant public key infrastructure

N Bindel, U Herath, M McKague, D Stebila - Post-Quantum Cryptography …, 2017 - Springer
To ensure uninterrupted cryptographic security, it is important to begin planning the
transition to post-quantum cryptography. In addition to creating post-quantum primitives, we …

From 5-pass-based identification to-based signatures

MS Chen, A Hülsing, J Rijneveld… - … Conference on the …, 2016 - Springer
This paper presents MQDSS, the first signature scheme with a security reduction based on
the problem of solving a multivariate system of quadratic equations (MQ problem). In order to …

Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic

L Bettale, JC Faugere, L Perret - Designs, Codes and Cryptography, 2013 - Springer
We investigate in this paper the security of HFE and Multi-HFE schemes as well as their
minus and embedding variants. Multi-HFE is a generalization of the well-known HFE …

Design for parallel interactive ray tracing systems

J Bigler, A Stephens, SG Parker - 2006 IEEE Symposium on …, 2006 - ieeexplore.ieee.org
We describe the software architecture of the Manta interactive ray tracer and describe its
application in engineering and scientific visualization. Although numerous ray tracing …

Revisiting TESLA in the quantum random oracle model

E Alkim, N Bindel, J Buchmann, Ö Dagdelen… - … , PQCrypto 2017, Utrecht …, 2017 - Springer
We study a scheme of Bai and Galbraith (CT-RSA'14), also known as TESLA. TESLA was
thought to have a tight security reduction from the learning with errors problem (LWE) in the …

A survey on post-quantum public-key signature schemes for secure vehicular communications

KA Shim - IEEE Transactions on Intelligent Transportation …, 2021 - ieeexplore.ieee.org
Basic security requirements such as confidentiality, user authentication and data integrity,
are assured by using public-key cryptography (PKC). In particular, public-key signature …