03563nam 22007095 450 99641821930331620200704155851.03-030-44223-310.1007/978-3-030-44223-1(CKB)4100000011223231(MiAaPQ)EBC6302156(DE-He213)978-3-030-44223-1(PPN)243760914(EXLCZ)99410000001122323120200326d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPost-Quantum Cryptography[electronic resource] 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings /edited by Jintai Ding, Jean-Pierre Tillich1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (xiii, 560 pages) illustrationsSecurity and Cryptology ;121003-030-44222-5 Includes bibliographical references and index.Code-based cryptography -- Implementation -- Isogeny-based cryptography -- Lattice-based cryptography -- Multivariate cryptography -- Quantum algorithms -- Security proofs.This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.Security and Cryptology ;12100Data encryption (Computer science)Computer securityComputer networksSecurity measuresComputersComputer communication systemsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Security Serviceshttps://scigraph.springernature.com/ontologies/product-market-codes/I28030Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Data encryption (Computer science).Computer security.Computer networksSecurity measures.Computers.Computer communication systems.Cryptology.Security Services.Systems and Data Security.Mobile and Network Security.Information Systems and Communication Service.Computer Communication Networks.005.82Ding Jintaiedthttp://id.loc.gov/vocabulary/relators/edtTillich Jean-Pierreedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418219303316Post-quantum cryptography230307UNISA