Cargando…

Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings /

This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Buchmann, Johannes (Editor ), Ding, Jintai (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Security and Cryptology ; 5299
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-88403-3
003 DE-He213
005 20220115050425.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540884033  |9 978-3-540-88403-3 
024 7 |a 10.1007/978-3-540-88403-3  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Post-Quantum Cryptography  |h [electronic resource] :  |b Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings /  |c edited by Johannes Buchmann, Jintai Ding. 
250 |a 1st ed. 2008. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2008. 
300 |a X, 231 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5299 
505 0 |a A New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. 
520 |a This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 0 |a User interfaces (Computer systems). 
650 0 |a Human-computer interaction. 
650 0 |a Electronic data processing-Management. 
650 0 |a Algorithms. 
650 0 |a Computer networks . 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
650 2 4 |a User Interfaces and Human Computer Interaction. 
650 2 4 |a IT Operations. 
650 2 4 |a Algorithms. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Buchmann, Johannes.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Ding, Jintai.  |e editor.  |0 (orcid)0000-0003-1257-7598  |1 https://orcid.org/0000-0003-1257-7598  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540890379 
776 0 8 |i Printed edition:  |z 9783540884026 
830 0 |a Security and Cryptology ;  |v 5299 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-88403-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)