|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-29360-8 |
003 |
DE-He213 |
005 |
20220115054850.0 |
007 |
cr nn 008mamaa |
008 |
160203s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319293608
|9 978-3-319-29360-8
|
024 |
7 |
|
|a 10.1007/978-3-319-29360-8
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Post-Quantum Cryptography
|h [electronic resource] :
|b 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings /
|c edited by Tsuyoshi Takagi.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a X, 267 p. 39 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9606
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February 2016. The 16 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers cover all technical aspects of multivariate polynomial cryptography, code-based cryptography, lattice-based cryptography, quantum algorithms, post-quantum protocols, and implementations.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Quantum computers.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Quantum Computing.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Takagi, Tsuyoshi.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319293592
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319293615
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9606
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-29360-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|