The eight papers presented in this book were carefully reviewed and selected from numerous submissions. These contributions are divided into two groups: The first four papers deal with the design of code-based cryptosystems, while the following four papers are on cryptanalysis of code-based cryptosystems.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.