Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Post-quantum cryptography12th Intern...
~
(1998 :)
Post-quantum cryptography12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Post-quantum cryptographyedited by Jung Hee Cheon, Jean-Pierre Tillich.
Reminder of title:
12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings /
remainder title:
PQCrypto 2021
other author:
Cheon, Jung Hee.
corporate name:
Published:
Cham :Springer International Publishing :2021.
Description:
xiii, 500 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science)
Online resource:
https://doi.org/10.1007/978-3-030-81293-5
ISBN:
9783030812935$q(electronic bk.)
Post-quantum cryptography12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings /
Post-quantum cryptography
12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings /[electronic resource] :PQCrypto 2021edited by Jung Hee Cheon, Jean-Pierre Tillich. - Cham :Springer International Publishing :2021. - xiii, 500 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,128410302-9743 ;. - Lecture notes in computer science ;4891..
Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric -- Multivariate Cryptography -- Improving Thomae-Wolf Algorithm for Solving Underdetermined -- Multivariate Quadratic Polynomial Problem -- New Practical Multivariate Signatures from a Nonlinear Modifier -- On the Effect of Projection on Rank Attacks in Multivariate Cryptography -- Quantum Algorithms -- Quantum Key Search for Ternary LWE -- A fusion algorithm for solving the hidden shift problem in finite abelian groups -- The "quantum annoying" property of password-authenticated key exchange protocols -- Implementation and Side channel attack -- Differential Power Analysis of the Picnic Signature Scheme -- Implementation of Lattice Trapdoors on Modules and Applications -- Verifying Post-Quantum Signatures in 8 KiB of RAM -- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists -- Isogeny -- CSI-RAShi: Distributed key generation for CSIDH -- SimS: a Simplification of SiGamal -- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE -- Lattice-Based Cryptography -- Generating cryptographically-strong random lattice bases and recognizing rotations of Z -- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions -- Short Identity-Based Signatures with Tight Security from Lattices -- On Removing Rejection Conditions in Practical Lattice-Based Signatures -- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems -- Cryptanalysis -- Attack on Beyond-Birthday-Bound MACs in Quantum Setting -- An algebraic approach to the Rank Support Learning problem -- Quantum Indistinguishability for Public Key Encryption -- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
ISBN: 9783030812935$q(electronic bk.)
Standard No.: 10.1007/978-3-030-81293-5doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25 / P73 2021
Dewey Class. No.: 005.824
Post-quantum cryptography12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings /
LDR
:03699nmm a2200373 a 4500
001
605310
003
DE-He213
005
20210714174727.0
006
m d
007
cr nn 008maaau
008
211201s2021 sz s 0 eng d
020
$a
9783030812935$q(electronic bk.)
020
$a
9783030812928$q(paper)
024
7
$a
10.1007/978-3-030-81293-5
$2
doi
035
$a
978-3-030-81293-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
P73 2021
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
P894 2021
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Post-quantum cryptography
$h
[electronic resource] :
$b
12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings /
$c
edited by Jung Hee Cheon, Jean-Pierre Tillich.
246
3
$a
PQCrypto 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xiii, 500 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12841
490
1
$a
Security and cryptology
505
0
$a
Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric -- Multivariate Cryptography -- Improving Thomae-Wolf Algorithm for Solving Underdetermined -- Multivariate Quadratic Polynomial Problem -- New Practical Multivariate Signatures from a Nonlinear Modifier -- On the Effect of Projection on Rank Attacks in Multivariate Cryptography -- Quantum Algorithms -- Quantum Key Search for Ternary LWE -- A fusion algorithm for solving the hidden shift problem in finite abelian groups -- The "quantum annoying" property of password-authenticated key exchange protocols -- Implementation and Side channel attack -- Differential Power Analysis of the Picnic Signature Scheme -- Implementation of Lattice Trapdoors on Modules and Applications -- Verifying Post-Quantum Signatures in 8 KiB of RAM -- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists -- Isogeny -- CSI-RAShi: Distributed key generation for CSIDH -- SimS: a Simplification of SiGamal -- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE -- Lattice-Based Cryptography -- Generating cryptographically-strong random lattice bases and recognizing rotations of Z -- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions -- Short Identity-Based Signatures with Tight Security from Lattices -- On Removing Rejection Conditions in Practical Lattice-Based Signatures -- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems -- Cryptanalysis -- Attack on Beyond-Birthday-Bound MACs in Quantum Setting -- An algebraic approach to the Rank Support Learning problem -- Quantum Indistinguishability for Public Key Encryption -- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.
520
$a
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Quantum computers
$v
Congresses.
$3
402475
650
1 4
$a
Cryptology.
$3
825728
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Systems and Data Security.
$3
274481
700
1
$a
Cheon, Jung Hee.
$3
339982
700
1
$a
Tillich, Jean-Pierre.
$3
884086
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-81293-5
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000203357
電子館藏
1圖書
電子書
EB QA76.9.A25 P894 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-81293-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login