Post-Quantum Cryptography
12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings
Herausgegeben:Cheon, Jung Hee; Tillich, Jean-Pierre
Post-Quantum Cryptography
12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings
Herausgegeben:Cheon, Jung Hee; Tillich, Jean-Pierre
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021.
The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
Andere Kunden interessierten sich auch für
- Post-Quantum Cryptography41,99 €
- Post-Quantum Cryptography41,99 €
- Post-Quantum Cryptography60,99 €
- Advances in Cryptology - ASIACRYPT 202189,99 €
- Provable and Practical Security61,99 €
- Public-Key Cryptography - PKC 2021113,99 €
- Cryptography and Coding61,99 €
-
-
-
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021.
The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 12841
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-81292-8
- 1st ed. 2021
- Seitenzahl: 516
- Erscheinungstermin: 15. Juli 2021
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 774g
- ISBN-13: 9783030812928
- ISBN-10: 3030812928
- Artikelnr.: 62056460
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
- Lecture Notes in Computer Science 12841
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-81292-8
- 1st ed. 2021
- Seitenzahl: 516
- Erscheinungstermin: 15. Juli 2021
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 774g
- ISBN-13: 9783030812928
- ISBN-10: 3030812928
- Artikelnr.: 62056460
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
Code-Based Cryptography.- Decoding supercodes of Gabidulin codes and applications to cryptanalysis.- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action.- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric.- Multivariate Cryptography.- Improving Thomae-Wolf Algorithm for Solving Underdetermined.- Multivariate Quadratic Polynomial Problem.- New Practical Multivariate Signatures from a Nonlinear Modifier.- On the Effect of Projection on Rank Attacks in Multivariate Cryptography.- Quantum Algorithms.- Quantum Key Search for Ternary LWE.- A fusion algorithm for solving the hidden shift problem in finite abelian groups.- The "quantum annoying" property of password-authenticated key exchange protocols.- Implementation and Side channel attack.- Differential Power Analysis of the Picnic Signature Scheme.- Implementation of Lattice Trapdoors on Modules and Applications.- Verifying Post-Quantum Signatures in 8 KiB of RAM.- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists.- Isogeny.- CSI-RAShi: Distributed key generation for CSIDH.- SimS: a Simplification of SiGamal.- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE.- Lattice-Based Cryptography.- Generating cryptographically-strong random lattice bases and recognizing rotations of Z.- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions.- Short Identity-Based Signatures with Tight Security from Lattices.- On Removing Rejection Conditions in Practical Lattice-Based Signatures.- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems.- Cryptanalysis.- Attack on Beyond-Birthday-Bound MACs in Quantum Setting.- An algebraic approach to the Rank Support Learning problem.- Quantum Indistinguishability for Public Key Encryption.- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.
Code-Based Cryptography.- Decoding supercodes of Gabidulin codes and applications to cryptanalysis.- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action.- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric.- Multivariate Cryptography.- Improving Thomae-Wolf Algorithm for Solving Underdetermined.- Multivariate Quadratic Polynomial Problem.- New Practical Multivariate Signatures from a Nonlinear Modifier.- On the Effect of Projection on Rank Attacks in Multivariate Cryptography.- Quantum Algorithms.- Quantum Key Search for Ternary LWE.- A fusion algorithm for solving the hidden shift problem in finite abelian groups.- The "quantum annoying" property of password-authenticated key exchange protocols.- Implementation and Side channel attack.- Differential Power Analysis of the Picnic Signature Scheme.- Implementation of Lattice Trapdoors on Modules and Applications.- Verifying Post-Quantum Signatures in 8 KiB of RAM.- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists.- Isogeny.- CSI-RAShi: Distributed key generation for CSIDH.- SimS: a Simplification of SiGamal.- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE.- Lattice-Based Cryptography.- Generating cryptographically-strong random lattice bases and recognizing rotations of Z.- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions.- Short Identity-Based Signatures with Tight Security from Lattices.- On Removing Rejection Conditions in Practical Lattice-Based Signatures.- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems.- Cryptanalysis.- Attack on Beyond-Birthday-Bound MACs in Quantum Setting.- An algebraic approach to the Rank Support Learning problem.- Quantum Indistinguishability for Public Key Encryption.- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.