Opendata, web and dolomites


Post-quantum cryptography for long-term security

Total Cost €


EC-Contrib. €






Project "PQCRYPTO" data sheet

The following table provides information about the project.


Organization address
address: GROENE LOPER 3
postcode: 5612 AE

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Netherlands [NL]
 Project website
 Total cost 3˙964˙791 €
 EC max contribution 3˙851˙791 € (97%)
 Programme 1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
 Code Call H2020-ICT-2014-1
 Funding Scheme RIA
 Starting year 2015
 Duration (year-month-day) from 2015-03-01   to  2018-02-28


Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
7    UNIVERSITY OF HAIFA IL (HAIFA) participant 343˙392.00
8    RUHR-UNIVERSITAET BOCHUM DE (BOCHUM) participant 342˙755.00
9    NXP SEMICONDUCTORS BELGIUM NV BE (LEUVEN) participant 321˙460.00
10    BUNDESDRUCKEREI GMBH DE (BERLIN) participant 217˙822.00
11    ACADEMIA SINICA TW (TAIPEI) participant 0.00


 Project objective

Online banking, e-commerce, telemedicine, mobile communication, and cloud computing depend fundamentally on the security of the underlying cryptographic algorithms. Public-key algorithms are particularly crucial since they provide digital signatures and establish secure communication without requiring in-person meetings.

Essentially all applications today are based on RSA or on the discrete-logarithm problem in finite fields or on elliptic curves. Cryptographers optimize parameter choices and implementation details for these systems and build protocols on top of these systems; cryptanalysts fine-tune attacks and establish exact security levels for these systems. Alternative systems are far less visible in research and unheard of in practice.

It might seem that having three systems offers enough variation, but these systems are all broken as soon as large quantum computers are built. The EU and governments around the world are investing heavily in building quantum computers; society needs to be prepared for the consequences, including cryptanalytic attacks accelerated by these computers. Long-term confidential documents such as patient health-care records and state secrets have to guarantee security for many years, but information encrypted today using RSA or elliptic curves and stored until quantum computers are available will then be as easy to decipher as Enigma-encrypted messages are today.

PQCRYPTO will allow users to switch to post-quantum cryptography: cryptographic systems that are not merely secure for today but that will also remain secure long-term against attacks by quantum computers. PQCRYPTO will design a portfolio of high-security post-quantum public-key systems, and will improve the speed of these systems, adapting to the different performance challenges of mobile devices, the cloud, and the Internet of Things. PQCRYPTO will provide efficient implementations of high-security post-quantum cryptography for a broad spectrum of real-world applications.


List of deliverables.
Small devices: Intermediate report on optimized hardware, Documents, reports 2019-06-19 17:51:08
Internet: Preliminary integration Documents, reports 2019-06-19 17:51:08
Standardization: Final report, Documents, reports 2019-06-19 17:51:08
Internet: Integration Documents, reports 2019-06-19 17:51:07
Management: second progress report Documents, reports 2019-06-19 17:51:08
Standardization: Preliminary report Documents, reports 2019-06-19 17:51:08
Cloud: Advanced applications Documents, reports 2019-06-19 17:51:07
Cloud: Security risks in secret-key cryptography Documents, reports 2019-06-19 17:51:08
Management: Project website and internal IT communication infrastructure Other 2019-06-19 17:51:08
Internet: Software library, Other 2019-06-19 17:51:07
Small devices: Intermediate report on physical attacks Documents, reports 2019-06-19 17:51:08
Small devices: Intermediate report on optimized software Documents, reports 2019-06-19 17:51:08
Cloud: Security risks in public-key cryptography Documents, reports 2019-06-19 17:51:07
Cloud: Long-term authenticated ciphers Documents, reports 2019-06-19 17:51:08
Cloud: Long-term public-key cryptography Documents, reports 2019-06-19 17:51:08
Small devices: Reference implementations Other 2019-06-19 17:51:08
Small devices: Final report Documents, reports 2019-06-19 17:51:08
Internet: Preliminary portfolio Documents, reports 2019-06-19 17:51:08
Management: first progeess report year 1 Documents, reports 2019-06-19 17:51:08
Management: Data management plan Documents, reports 2019-06-19 17:51:07
Small devices: Final implementations Other 2019-06-19 17:51:08
Small devices: Intermediate report on algorithms Documents, reports 2019-06-19 17:51:08
Internet: Portfolio Documents, reports 2019-06-19 17:51:07

Take a look to the deliverables list in detail:  detailed list of PQCRYPTO deliverables.


year authors and title journal last update
List of publications.
2017 Nina Bindel, Johannes Buchmann, Susanne Rieß
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols
published pages: , ISSN: 1615-5262, DOI: 10.1007/s10207-017-0397-6
International Journal of Information Security 2019-06-19
2018 Daniel Augot, Pierre Loidreau, Gwezheneg Robert
Generalized Gabidulin codes over fields of any characteristic
published pages: 1807-1848, ISSN: 0925-1022, DOI: 10.1007/s10623-017-0425-6
Designs, Codes and Cryptography 86/8 2019-06-19
2017 Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak
published pages: 555-576, ISSN: , DOI: 10.1007/978-3-319-66787-4_27
CHES 2017 2019-06-19
2017 Nir Drucker, Shay Gueron, Benny Pinkas
Faster Secure Cloud Computations with a Trusted Proxy
published pages: 61-67, ISSN: 1540-7993, DOI: 10.1109/MSP.2017.4251121
IEEE Security & Privacy 15/6 2019-06-19
2018 Leon Groot Bruinderink, Andreas Hülsing
\"\"\"Oops, I did it again\"\" - Security of One-Time Signatures under Two-Message Attacks\"
published pages: 299-322, ISSN: , DOI: 10.1007/978-3-319-72565-9_15
SAC 2017 2019-06-19
2018 Shoni Gilboa, Shay Gueron, Ben Morris
How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function?
published pages: 162-171, ISSN: 0933-2790, DOI: 10.1007/s00145-017-9253-0
Journal of Cryptology 31/1 2019-06-19
2018 Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme
published pages: , ISSN: 2569-2925, DOI: 10.13154/tches.v2018.i1.238-268
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019-06-19
2019 Tobias Oder and Tim Güneysu
Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs.
published pages: , ISSN: , DOI:
Latincrypt to appear 2019-06-19
2018 Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
published pages: 885-916, ISSN: 0933-2790, DOI: 10.1007/s00145-017-9273-9
Journal of Cryptology 31/3 2019-06-19
2018 Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
QC-MDPC: A Timing Attack and a CCA2 KEM
published pages: 47-76, ISSN: , DOI: 10.1007/978-3-319-79063-3_3
PQCrypto 2018 2019-06-19
2018 Stoffelen, Ko; Daemen, Joan
Column Parity Mixers
published pages: 126-159, ISSN: 2519-173X, DOI: 10.13154/tosc.v2018.i1.126-159
IACR Transactions on Symmetric Cryptology 1 2019-06-19
2017 Kranz, Thorsten; Leander, Gregor; Stoffelen, Ko; Wiemer, Friedrich
Shorter Linear Straight-Line Programs for MDS Matrices
published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i4.188-211
IACR Transactions on Symmetric Cryptology 4 2019-06-19
2017 Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
published pages: 404-427, ISSN: 0018-9448, DOI: 10.1109/TIT.2016.2574841
IEEE Transactions on Information Theory 63/1 2019-06-19
2016 Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
Post-quantum Key Exchange -- A New Hope
published pages: , ISSN: , DOI:
25th USENIX Security Symposium (USENIX Security 16) 2019-06-19
2016 Kölbl, Stefan; Lauridsen, Martin M.; Mendel, Florian; Rechberger, Christian
Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2016.i2.1-29
IACR Transactions on Symmetric Cryptology 5 2019-06-19
2016 Gilboa, Shoni; Gueron, Shay
The Advantage of Truncated Permutations
published pages: , ISSN: , DOI:
2016 Kaplan, Marc; Leurent, Gaëtan; Leverrier, Anthony; Naya-Plasencia, María
Quantum Differential and Linear Cryptanalysis
published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2016.i1.71-94
IACR Transactions on Symmetric Cryptology 9 2019-06-19
2016 Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret, Frederic de Portzamparc, Jean-Pierre Tillich
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
published pages: 184-198, ISSN: 0018-9448, DOI: 10.1109/TIT.2015.2493539
IEEE Transactions on Information Theory 62/1 2019-06-19
2017 Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
Post-quantum RSA.
published pages: 311-329, ISSN: , DOI: 10.1007/978-3-319-59879-6_18
PQCrypto 2017 2019-06-19
2017 Gustavo Banegas, Daniel J. Bernstein
Low-Communication Parallel Quantum Multi-Target Preimage Search
published pages: 325-335, ISSN: , DOI: 10.1007/978-3-319-72565-9_16
SAC 2017 2019-06-19
2017 Ghazal Kachigar, Jean-Pierre Tillich
Quantum Information Set Decoding Algorithms
published pages: 69-89, ISSN: , DOI: 10.1007/978-3-319-59879-6_5
PQCrypto 2017 2019-06-19
2016 Shay Gueron, Vlad Krasnov
Fast Quicksort Implementation Using AVX Instructions
published pages: bxv063, ISSN: 0010-4620, DOI: 10.1093/comjnl/bxv063
The Computer Journal 2019-06-19
2016 Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
published pages: 44-60, ISSN: , DOI: 10.1007/978-3-319-31517-1_3
Africacrypt 2016 2019-06-19
2018 Robin Kwant, Tanja Lange, Kimberley Thissen
Lattice Klepto: turning post-quantum crypto against itself
published pages: 336-354, ISSN: , DOI: 10.1007/978-3-319-72565-9_17
SAC 2017 2019-06-19
2018 Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
Post-quantum security of the sponge construction.. Post-Quantum Cryptography.
published pages: 185-204, ISSN: , DOI: 10.1007/978-3-319-79063-3_9
PQCrypto 2018 2019-06-19
2018 Daniel J. Bernstein, Bo-Yin Yang
Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations
published pages: 487-506, ISSN: , DOI: 10.1007/978-3-319-79063-3_23
PQCrypto 2018 2019-06-19
2016 Shay Gueron, Nicky Mouha
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
published pages: 95-125, ISSN: , DOI: 10.1007/978-3-662-53887-6_4
ASIACRYPT 2016: Advances in Cryptology 2019-06-19
2016 Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
published pages: 24-43, ISSN: , DOI: 10.1007/978-3-319-31517-1_2
Africacrypt 2016 2019-06-19
2017 Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
A Low-Resource Quantum Factoring Algorithm
published pages: 330-346, ISSN: , DOI: 10.1007/978-3-319-59879-6_19
PQCrypto 2017 2019-06-19
2017 Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Memory-Efficient Algorithms for Finding Needles in Haystacks.
published pages: 185-206, ISSN: , DOI: 10.1007/978-3-662-53008-5_7
Crypto 2017 2019-06-19
2016 Shay Gueron
Memory Encryption for General-Purpose Processors
published pages: 54-62, ISSN: 1540-7993, DOI: 10.1109/MSP.2016.124
IEEE Security & Privacy 14/6 2019-06-19
2017 Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
Gimli: a cross-platform permutation
published pages: 299-320, ISSN: , DOI: 10.1007/978-3-319-66787-4_15
CHES 2017 2019-06-19
2017 Andreas Hülsing, Joost Rijneveld, John Schanck, Peter Schwabe
High-speed key encapsulation from NTRU.
published pages: 232-252, ISSN: , DOI: 10.1007/978-3-319-66787-4_12
CHES 2017 2019-06-19
2016 Stoffelen, K.
Instruction Scheduling and Register Allocation on ARM Cortex-M
published pages: , ISSN: , DOI:
SPEED-B - Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, 1 - 9. [S.l. : s.n.] 2019-06-19
2018 Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
SOFIA: MQ-based signatures in the QROM
published pages: 3-33, ISSN: , DOI: 10.1007/978-3-319-76581-5_1
PKC 2018 2019-06-19
2016 Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem
published pages: 1093-1105, ISSN: 1556-6013, DOI: 10.1109/TIFS.2015.2509944
IEEE Transactions on Information Forensics and Security 11/6 2019-06-19
2016 Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
Structural cryptanalysis of McEliece schemes with compact keys
published pages: 87-112, ISSN: 0925-1022, DOI: 10.1007/s10623-015-0036-z
Designs, Codes and Cryptography 79/1 2019-06-19
2017 Alain Couvreur, Irene Marquez-Corbella, Ruud Pellikaan
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes
published pages: 5404-5418, ISSN: 0018-9448, DOI: 10.1109/TIT.2017.2712636
IEEE Transactions on Information Theory 63/8 2019-06-19
2017 Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
Short generators without quantum computers: the case of multiquadratics
published pages: 27-59, ISSN: , DOI: 10.1007/978-3-319-56620-7_2
Eurocrypt 2017 2019-06-19
2018 Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
NTRU prime: reducing attack surface at low cost
published pages: 235-260, ISSN: , DOI: 10.1007/978-3-319-72565-9_12
SAC 2017 2019-06-19
2018 Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
Practical CCA2-Secure and Masked Ring-LWE Implementation
published pages: , ISSN: 2569-2925, DOI: 10.13154/tches.v2018.i1.142-174
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019-06-19
2017 Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
published pages: 225-241, ISSN: , DOI: 10.1007/978-3-319-75650-9_15
Foundations and Practice of Security 2019-06-19
2017 Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
Revisiting the Expected Cost of Solving uSVP and Applications to LWE
published pages: 297-322, ISSN: , DOI: 10.1007/978-3-319-70694-8_11
Asiacrypt 2017 2019-06-19
2017 Bardet , Magali; Barelli , Elise; Blazy , Olivier; Canto Torres , Rodolfo; Couvreur , Alain; Gaborit , Philippe; Otmani , Ayoub; Sendrier , Nicolas; Tillich , Jean-Pierre
BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation
published pages: , ISSN: , DOI:
submission to the NIST post quantum cryptography standardization process. 2017 2019-06-19
2017 Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
Identity-Based Encryption from Codes with Rank Metric
published pages: 194-224, ISSN: , DOI: 10.1007/978-3-319-63697-9_7
CRYPTO 2017: Advances in Cryptology 2019-06-19
2016 Sébastien Duval, Virginie Lallemand, Yann Rotella
Cryptanalysis of the FLIP Family of Stream Ciphers
published pages: 457-475, ISSN: , DOI: 10.1007/978-3-662-53018-4_17
CRYPTO 2016: Advances in Cryptology 2019-06-19
2017 Aragon , Nicolas; Barreto , Paulo ,; Bettaieb , Slim; Bidoux , Loïc; Blazy , Olivier; Deneuville , Jean-Christophe; Gaborit , Philippe; Gueron , Shay; Guneysu , Tim; Aguilar Melchor , Carlos; Misoczki , Rafael; Persichetti , Edoardo; Sendrier , Nicolas; Tillich , Jean-Pierre; Zémor , Gilles
BIKE: Bit Flipping Key Encapsulation
published pages: , ISSN: , DOI: 2019-06-19
2016 Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
On error distributions in ring-based LWE
published pages: 130-145, ISSN: 1461-1570, DOI: 10.1112/S1461157016000280
LMS Journal of Computation and Mathematics 19/A 2019-06-19
2017 Mohamed Saied Emam Mohamed, Albrecht Petzoldt
RingRainbow - An Efficient Multivariate Ring Signature Scheme
published pages: 3-20, ISSN: , DOI: 10.1007/978-3-319-57339-7_1
Africacrypt 2017 2019-06-19
2018 Daniel J. Bernstein
Is the security of quantum cryptography guaranteed by the laws of physics?
published pages: , ISSN: , DOI:
quant-ph arXiv 1803.0452 2019-06-19
2017 Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
Revisiting TESLA in the quantum random oracle model
published pages: 143-162, ISSN: , DOI: 10.1007/978-3-319-59879-6_9
PQCrypto 2017 2019-06-19
2017 Patrick Holzer, Thomas Wunderer, Johannes A. Buchmann
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α * q^β
published pages: 346-368, ISSN: , DOI: 10.1007/978-3-319-71667-1_18
Indocrypt 2017 2019-06-19
2016 Peter Schwabe, Bas Westerbaan
Solving binary MQ with Grover\'s algorithm
published pages: 303-322, ISSN: , DOI: 10.1007/978-3-319-49445-6_17
SPACE 2016 2019-06-19
2018 Stefan Kölbl
Putting Wings on SPHINCS
published pages: 205-226, ISSN: , DOI: 10.1007/978-3-319-79063-3_10
PQCrypto 2018 2019-06-19
2017 Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
CAKE: Code-based Algorithm for Key Encapsulation
published pages: 207-226, ISSN: , DOI: 10.1007/978-3-319-71045-7_11
16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings 2019-06-19
2017 Tomer Ashur, Orr Dunkelman, Atul Luykx
Boosting Authenticated Encryption Robustness with Minimal Modifications
published pages: 3-33, ISSN: , DOI: 10.1007/978-3-319-63697-9_1
CRYPTO 2017 2019-06-19
2018 A. Huelsing D. Butin S. Gazdag J. Rijneveld A. Mohaisen
XMSS: eXtended Merkle Signature Scheme
published pages: , ISSN: , DOI: 10.17487/RFC8391
RFC 8391 2019-06-19
2016 Oscar Reparaz, Sujoy Sinha Roy, Ruan de Clercq, Frederik Vercauteren, Ingrid Verbauwhede
Masking ring-LWE
published pages: 139-153, ISSN: 2190-8508, DOI: 10.1007/s13389-016-0126-5
Journal of Cryptographic Engineering 6/2 2019-06-19
2017 Ashur, Tomer; Bar-On, Achiya; Dunkelman, Orr
Cryptanalysis of GOST2
published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.203-214
IACR Transactions on Symmetric Cryptology 8 2019-06-19
2017 Dan Boneh, Shay Gueron
Surnaming Schemes, Fast Verification, and Applications to SGX Technology
published pages: 149-164, ISSN: , DOI: 10.1007/978-3-319-52153-4_9
CT-RSA 2017 2019-06-19
2017 Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
published pages: 184-202, ISSN: , DOI: 10.1007/978-3-319-59879-6_11
PQCrypto 2017 2019-06-19
2018 Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
Efficient Slide Attacks
published pages: 641-670, ISSN: 0933-2790, DOI: 10.1007/s00145-017-9266-8
Journal of Cryptology 31/3 2019-06-19
2018 Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction
published pages: 203-216, ISSN: , DOI: 10.1007/978-3-319-89339-6_12
AFRICACRYPT 2018 2019-06-19
2015 Ingo Von Maurich, Tobias Oder, Tim Güneysu
Implementing QC-MDPC McEliece Encryption
published pages: 1-27, ISSN: 1539-9087, DOI: 10.1145/2700102
ACM Transactions on Embedded Computing Systems 14/3 2019-06-19
2018 Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
Differential Power Analysis of XMSS and SPHINCS
published pages: 168-188, ISSN: , DOI: 10.1007/978-3-319-89641-0_10
COSADE 2018 2019-06-19
2017 Bart Mennink, Alan Szepieniec
XOR of PRPs in a Quantum World
published pages: 367-383, ISSN: , DOI: 10.1007/978-3-319-59879-6_21
PQCrypto 2017 2019-06-19
2017 André Chailloux, María Naya-Plasencia, André Schrottenloher
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography
published pages: 211-240, ISSN: , DOI: 10.1007/978-3-319-70697-9_8
Asiacrypt 2017 2019-06-19
2016 Ashur, Tomer; Dunkelman, Orr; Talmon, Nimrod
Breaching the Privacy of Israel\'s Paper Ballot Voting System
published pages: , ISSN: 0302-9743, DOI:
Lecture Notes in Computer Science 6 2019-06-19
2018 Andreas Hülsing, Tanja Lange, Kit Smeets
Rounded Gaussians
published pages: 728-757, ISSN: , DOI: 10.1007/978-3-319-76581-5_25
PKC 2018 2019-06-19
2017 Yves Aubry, Wouter Castryck, Sudhir R. Ghorpade, Gilles Lachaud, Michael E. O’Sullivan, Samrith Ram
Hypersurfaces in Weighted Projective Spaces Over Finite Fields with Applications to Coding Theory
published pages: 25-61, ISSN: , DOI: 10.1007/978-3-319-63931-4_2
Algebraic Geometry for Coding Theory and Cryptography 2019-06-19
2017 Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
A Practical Multivariate Blind Signature Scheme
published pages: 437-454, ISSN: , DOI: 10.1007/978-3-319-70972-7_25
Financial Cryptography and Data Security 2017 2019-06-19
2017 Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
Transitioning to a Quantum-Resistant Public Key Infrastructure
published pages: 384-405, ISSN: , DOI: 10.1007/978-3-319-59879-6_22
PQCrypto 2017 2019-06-19
2018 Tillich, Jean-Pierre
The decoding failure probability of MDPC codes
published pages: , ISSN: , DOI:
2015 Tim Guneysu, Vadim Lyubashevsky, Thomas Poppelmann
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
published pages: 1954-1967, ISSN: 0018-9340, DOI: 10.1109/TC.2014.2346177
IEEE Transactions on Computers 64/7 2019-06-19
2017 Erick Nascimento, Łukasz Chmielewski, David Oswald, Peter Schwabe
Attacking Embedded ECC Implementations Through cmov Side Channels
published pages: 99-119, ISSN: , DOI: 10.1007/978-3-319-69453-5_6
SAC 2016 2019-06-19
2017 Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers
published pages: 1-24, ISSN: 1539-9087, DOI: 10.1145/3092951
ACM Transactions on Embedded Computing Systems 16/4 2019-06-19
2019 Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
published pages: , ISSN: , DOI:
Eurocrypt 2019, lecture notes in computer science 2019-06-19
2018 Daniel J. Bernstein and Edoardo Persichetti
Towards KEM Unification
published pages: , ISSN: , DOI:
IACR ePrint archive 2018/526 2019-06-19
2018 Steven D. Galbraith, Frederik Vercauteren
Computational problems in supersingular elliptic curve isogenies
published pages: , ISSN: 1570-0755, DOI: 10.1007/s11128-018-2023-6
Quantum Information Processing 17/10 2019-06-19

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "PQCRYPTO" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email ( and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "PQCRYPTO" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.2.1.1.)

5G-DIVE (2019)

5G-DIVE: eDge Intelligence for Vertical Experimentation

Read More  

RADON (2019)

Rational decomposition and orchestration for serverless computing

Read More  

ORIGIN (2020)

Optical Fibre Dose Imaging for Adaptive Brachytherapy

Read More