Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6061 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cryptanalysis of Multivariate Systems
- Properties of the Discrete Differential with Cryptographic Applications
- Growth of the Ideal Generated by a Quadratic Boolean Function
- Mutant Zhuang-Zi Algorithm
- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme
- Cryptanalysis of Code-Based Systems
- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
- Grover vs. McEliece
- Information-Set Decoding for Linear Codes over F q
- A Timing Attack against the Secret Permutation in the McEliece PKC
- Practical Power Analysis Attacks on Software Implementations of McEliece
- Design of Encryption Schemes
- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
- Designing a Rank Metric Based McEliece Cryptosystem
- Secure Variants of the Square Encryption Scheme
- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers
- Design of Signature Schemes
- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
- Proposal of a Signature Scheme Based on STS Trapdoor
- Selecting Parameters for the Rainbow Signature Scheme.