Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
MQ on my mind: Post-quantum signatures from the non-structured multivariate quadratic problem
This paper presents MQ on my Mind (MQOM), a digital signature scheme based on the
difficulty of solving multivariate systems of quadratic equations (MQ problem). MQOM has …
difficulty of solving multivariate systems of quadratic equations (MQ problem). MQOM has …
A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness
Abstract The Fujisaki-Okamoto (FO) transformation is used in most proposals for post-
quantum secure key encapsulation mechanisms (KEMs) like, eg, Kyber. The security …
quantum secure key encapsulation mechanisms (KEMs) like, eg, Kyber. The security …
On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH
A popular way to build post-quantum signature schemes is by first constructing an
identification scheme (IDS) and applying the Fiat-Shamir transform to it. In this work we …
identification scheme (IDS) and applying the Fiat-Shamir transform to it. In this work we …
Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller
Y Ouyang, D Tang, Y Xu - International Conference on the Theory and …, 2025 - Springer
Zero-Knowledge (ZK) protocols allow a prover to demonstrate the truth of a statement
without disclosing additional information about the underlying witness. Code-based …
without disclosing additional information about the underlying witness. Code-based …
SDitH in Hardware
This work presents the first hardware realisation of the Syndrome-Decodingin-the-Head
(SDitH) signature scheme, which is a candidate in the NIST PQC process for standardising …
(SDitH) signature scheme, which is a candidate in the NIST PQC process for standardising …
[BOEK][B] Advances in Cryptology–ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou …
J Guo, R Steinfeld - 2023 - books.google.com
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th
International Conference on the Theory and Application of Cryptology and Information …
International Conference on the Theory and Application of Cryptology and Information …
: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
We present ReSolveD, a new candidate post-quantum signature scheme under the regular
syndrome decoding (RSD) assumption for random linear codes, which is a well-established …
syndrome decoding (RSD) assumption for random linear codes, which is a well-established …
[PDF][PDF] Report on evaluation of KpqC candidates
This report covers our work on the submissions to the KpqC competition. We analyzed all
submitted KEMs and signature systems. For those that withstood cryptanalysis, we checked …
submitted KEMs and signature systems. For those that withstood cryptanalysis, we checked …
Report on evaluation of KpqC Round-2 candidates
DJ Bernstein, J Cottaar, E Di Giandomenico… - Cryptology ePrint …, 2024 - eprint.iacr.org
This report covers our analysis (security, proofs, efficiency) of the Round-2 candidates to the
Korean post-quantum competiton KpqC. Signature systems covered in the report are AIMer …
Korean post-quantum competiton KpqC. Signature systems covered in the report are AIMer …
AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs
The recent VOLE-based interactive zero-knowledge (VOLE-ZK) protocols along with non-
interactive zero-knowledge (NIZK) proofs based on MPC-in-the-Head (MPCitH) and VOLE …
interactive zero-knowledge (NIZK) proofs based on MPC-in-the-Head (MPCitH) and VOLE …