Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Post-quantum cryptography10th Intern...
~
(1998 :)
Post-quantum cryptography10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Post-quantum cryptographyedited by Jintai Ding, Rainer Steinwandt.
Reminder of title:
10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 : revised selected papers /
remainder title:
PQCrypto 2019
other author:
Ding, Jintai.
corporate name:
Published:
Cham :Springer International Publishing :2019.
Description:
xiii, 418 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science)
Online resource:
https://doi.org/10.1007/978-3-030-25510-7
ISBN:
9783030255107$q(electronic bk.)
Post-quantum cryptography10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 : revised selected papers /
Post-quantum cryptography
10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 : revised selected papers /[electronic resource] :PQCrypto 2019edited by Jintai Ding, Rainer Steinwandt. - Cham :Springer International Publishing :2019. - xiii, 418 p. :ill., digital ;24 cm. - Lecture notes in computer science,115050302-9743 ;. - Lecture notes in computer science ;4891..
Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Lattice-based Cryptography, Learning with Errors, Cryptanalysis, Key Establishment, Isogeny-based Cryptography, Hash-based cryptography, Code-based Cryptography.
ISBN: 9783030255107$q(electronic bk.)
Standard No.: 10.1007/978-3-030-25510-7doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25 / I57 2019
Dewey Class. No.: 005.82
Post-quantum cryptography10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 : revised selected papers /
LDR
:03340nmm a2200373 a 4500
001
563704
003
DE-He213
005
20190713122004.0
006
m d
007
cr nn 008maaau
008
200311s2019 gw s 0 eng d
020
$a
9783030255107$q(electronic bk.)
020
$a
9783030255091$q(paper)
024
7
$a
10.1007/978-3-030-25510-7
$2
doi
035
$a
978-3-030-25510-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I57 2019
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
I61 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Post-quantum cryptography
$h
[electronic resource] :
$b
10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 : revised selected papers /
$c
edited by Jintai Ding, Rainer Steinwandt.
246
3
$a
PQCrypto 2019
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xiii, 418 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11505
490
1
$a
Security and cryptology
505
0
$a
Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.
520
$a
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Lattice-based Cryptography, Learning with Errors, Cryptanalysis, Key Establishment, Isogeny-based Cryptography, Hash-based cryptography, Code-based Cryptography.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Quantum computers
$v
Congresses.
$3
402475
650
1 4
$a
Cryptology.
$3
825728
650
2 4
$a
Security.
$3
760527
650
2 4
$a
Computing Milieux.
$3
275270
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
700
1
$a
Ding, Jintai.
$3
260160
700
1
$a
Steinwandt, Rainer.
$3
709056
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-25510-7
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000175008
電子館藏
1圖書
電子書
EB QA76.9.A25 I61 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-25510-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login