| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996207132903316 |
|
|
Titolo |
Labyrinth |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Georgetown, Washington, D.C., : Georgetown University |
|
|
|
|
|
|
|
Soggetti |
|
Middle Ages |
Civilization, Medieval |
Computer network resources. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Periodico |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Sommario/riassunto |
|
Labyrinth is an expanding information network which provides free access to electronic resources in medieval studies. |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910686790803321 |
|
|
Titolo |
Code-Based Cryptography : 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers / / edited by Jean-Christophe Deneuville |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
ISBN |
|
9783031296895 |
9783031296888 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (163 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 13839 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer networks |
Coding theory |
Information theory |
Data protection |
Computer networks - Security measures |
Cryptology |
Computer Communication Networks |
Coding and Information Theory |
Data and Information Security |
|
|
|
|
|
|
|
|
|
|
|
|
Mobile and Network Security |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Distinguishing and Recovering Generalized Linearized ReedSolomon Codes -- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation -- Key-Recovery Fault Injection Attack on the Classic McEliece KEM -- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC -- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes -- On Decoding High-Order Interleaved Sum-Rank-Metric Codes -- Information Set Decoding for Lee-Metric Codes using Restricted Balls -- Cryptanalysis of IvanovKroukZyablov cryptosystem . |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway. The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques. |
|
|
|
|
|
|
|
| |