Breaking rainbow takes a weekend on a laptop

W Beullens - Annual International Cryptology Conference, 2022 - Springer
This work introduces new key recovery attacks against the Rainbow signature scheme,
which is one of the three finalist signature schemes still in the NIST Post-Quantum …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

SoK: CryptographicEstimators--a Software Library for Cryptographic Hardness Estimation

A Esser, J Verbel, F Zweydinger, E Bellini - Proceedings of the 19th ACM …, 2024 - dl.acm.org
The selection of parameters that offer best possible performance while simultaneously
guaranteeing a well-defined level of security is one of the most challenging tasks in …

A subexponential quantum algorithm for the semidirect discrete logarithm problem

C Battarbee, D Kahrobaei, L Perret… - … Conference on Post …, 2024 - Springer
Group-based cryptography is a relatively unexplored family in post-quantum cryptography,
and the so-called Semidirect Discrete Logarithm Problem (SDLP) is one of its most central …

A new perturbation for multivariate public key schemes such as HFE and UOV

JC Faugère, J Patarin, L Perret - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present here the analysis of a new perturbation, that seems to strengthen significantly
the security of some families of multivariate schemes. Thanks to this new perturbation, we …

Refined f5 algorithms for ideals of minors of square matrices

S Gopalakrishnan, V Neiger… - Proceedings of the 2023 …, 2023 - dl.acm.org
We consider the problem of computing a grevlex Gröbner basis for the set Fr (M) of minors of
size r of an n× n matrix M of generic linear forms over a field of characteristic zero or large …

State of the Art of HFE Variants: Is It Possible to Repair HFE with Appropriate Modifiers?

B Cogliati, G Macariot-Rat, J Patarin… - … Conference on Post …, 2024 - Springer
Abstract (that stands for Hidden Field Equations) belongs to multivariate cryptography and
was designed by Jacques Patarin in 1996 as a public key trapdoor suitable for encryption or …

[图书][B] Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022 …

Y Dodis, T Shrimpton - 2022 - books.google.com
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings
of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in …

Public-Key Cryptography–PKC 2024

Q Tang, V Teague - Proceedings of the 27th IACR International …, 2024 - Springer
The 27th International Conference on Practice and Theory of Public-Key Cryptography (PKC
2024) was held in Sydney, Australia, on April 15–17, 2024. It was sponsored by the …

New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes

B Cogliati, PA Fouque, L Goubin… - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Hash-and-Sign with Retry is a popular technique to design efficient signature
schemes from code-based or multivariate assumptions. Contrary to Hash-and-Sign …