Cargando…

Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings /

This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects o...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Gaborit, Philippe (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Edición:1st ed. 2013.
Colección:Security and Cryptology ; 7932
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-38616-9
003 DE-He213
005 20220115072749.0
007 cr nn 008mamaa
008 130605s2013 gw | s |||| 0|eng d
020 |a 9783642386169  |9 978-3-642-38616-9 
024 7 |a 10.1007/978-3-642-38616-9  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Post-Quantum Cryptography  |h [electronic resource] :  |b 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings /  |c edited by Philippe Gaborit. 
250 |a 1st ed. 2013. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013. 
300 |a X, 259 p. 17 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 7932 
505 0 |a Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures -- Quantum Algorithms for the Subset-Sum Problem -- Improved Lattice-Based Threshold Ring Signature Scheme -- Degree of Regularity for HFEv and HFEv- -- Software Speed Records for Lattice-Based Signatures -- Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search -- An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional -- Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations -- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework -- Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme -- A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems -- Secure and Anonymous Hybrid Encryption from Coding Theory -- Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes -- The Hardness of Code Equivalence over Fq and Its Application to Code-Based Cryptography -- Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems -- Simple Matrix Scheme for Encryption -- Multivariate Signature Scheme Using Quadratic Forms. 
520 |a This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 0 |a Quantum computers. 
650 0 |a Electronic data processing-Management. 
650 0 |a Algorithms. 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Quantum Computing. 
650 2 4 |a IT Operations. 
650 2 4 |a Algorithms. 
700 1 |a Gaborit, Philippe.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642386176 
776 0 8 |i Printed edition:  |z 9783642386152 
830 0 |a Security and Cryptology ;  |v 7932 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-38616-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)