Loading…

Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings /

Bibliographic Details
Call Number:Libro Electrónico
Corporate Author: SpringerLink (Online service)
Other Authors: Sendrier, Nicolas (Editor)
Format: Electronic eBook
Language:Inglés
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edition:1st ed. 2010.
Series:Security and Cryptology ; 6061
Subjects:
Online Access:Texto Completo
Table of Contents:
  • Cryptanalysis of Multivariate Systems
  • Properties of the Discrete Differential with Cryptographic Applications
  • Growth of the Ideal Generated by a Quadratic Boolean Function
  • Mutant Zhuang-Zi Algorithm
  • Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme
  • Cryptanalysis of Code-Based Systems
  • Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
  • Grover vs. McEliece
  • Information-Set Decoding for Linear Codes over F q
  • A Timing Attack against the Secret Permutation in the McEliece PKC
  • Practical Power Analysis Attacks on Software Implementations of McEliece
  • Design of Encryption Schemes
  • Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
  • Designing a Rank Metric Based McEliece Cryptosystem
  • Secure Variants of the Square Encryption Scheme
  • Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers
  • Design of Signature Schemes
  • Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
  • Proposal of a Signature Scheme Based on STS Trapdoor
  • Selecting Parameters for the Rainbow Signature Scheme.