00893nam1-22003251i-450-99000074548040332120001010000074548FED01000074548(Aleph)000074548FED0100007454820001010d--------km-y0itay50------baitay-------001yyNeapelvon Wilhelm RolfsLeipzigtip. Seemann1905-2 v.24 cmBeruhmte Kunststahen29, 30Include un indice dei nomiNAPOLI GRECOROMANAarti figurativeNAPOLIarchitetturasec. XIIIXVRolfs,Wilhelm37218ITUNINARICAUNIMARCBK990000745480403321RARI B 342/1-22763a;2763bFARBCFARBCNeapel321917UNINAING0104688nam 22006975 450 991049214460332120251225174926.03-030-81293-610.1007/978-3-030-81293-5(CKB)4100000011982116(MiAaPQ)EBC6678843(Au-PeEL)EBL6678843(PPN)25735896X(BIP)80928847(BIP)80653891(DE-He213)978-3-030-81293-5(EXLCZ)99410000001198211620210714d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPost-Quantum Cryptography 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings /edited by Jung Hee Cheon, Jean-Pierre Tillich1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (502 pages)Security and Cryptology,2946-1863 ;128413-030-81292-8 Includes bibliographical references and index.Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric -- Multivariate Cryptography -- Improving Thomae-Wolf Algorithm for Solving Underdetermined -- Multivariate Quadratic Polynomial Problem -- New Practical Multivariate Signatures from a Nonlinear Modifier -- On the Effect of Projection on Rank Attacks in Multivariate Cryptography -- Quantum Algorithms -- Quantum Key Search for Ternary LWE -- A fusion algorithm for solving the hidden shift problem in finite abelian groups -- The “quantum annoying” property of password-authenticated key exchange protocols -- Implementation and Side channel attack -- Differential Power Analysis of the Picnic Signature Scheme -- Implementation of Lattice Trapdoors on Modules and Applications -- Verifying Post-Quantum Signatures in 8 KiB of RAM -- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists -- Isogeny -- CSI-RAShi: Distributed key generation for CSIDH -- SimS: a Simplification of SiGamal -- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE -- Lattice-Based Cryptography -- Generating cryptographically-strong random lattice bases and recognizing rotations of Z -- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions -- Short Identity-Based Signatures with Tight Security from Lattices -- On Removing Rejection Conditions in Practical Lattice-Based Signatures -- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems -- Cryptanalysis -- Attack on Beyond-Birthday-Bound MACs in Quantum Setting -- An algebraic approach to the Rank Support Learning problem -- Quantum Indistinguishability for Public Key Encryption -- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.Security and Cryptology,2946-1863 ;12841CryptographyData encryption (Computer science)Computer engineeringComputer networksData protectionCryptologyComputer Engineering and NetworksComputer Communication NetworksData and Information SecurityCryptography.Data encryption (Computer science).Computer engineering.Computer networks.Data protection.Cryptology.Computer Engineering and Networks.Computer Communication Networks.Data and Information Security.005.824Tillich Jean-PierreCheon Jung HeeMiAaPQMiAaPQMiAaPQBOOK9910492144603321Post-quantum cryptography230307UNINA