04371nam 22008055 450 99646588000331620230911201730.01-280-38644-497866135643683-642-12929-310.1007/978-3-642-12929-2(CKB)2550000000011548(SSID)ssj0000446695(PQKBManifestationID)11282029(PQKBTitleCode)TC0000446695(PQKBWorkID)10504345(PQKB)10221391(DE-He213)978-3-642-12929-2(MiAaPQ)EBC3065323(PPN)149063229(EXLCZ)99255000000001154820100531d2010 u| 0engurnn#008mamaatxtccrPost-Quantum Cryptography[electronic resource] Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings /edited by Nicolas Sendrier1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (X, 241 p. 27 illus.)Security and Cryptology ;6061Includes index.3-642-12928-5 Cryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic Applications -- Growth of the Ideal Generated by a Quadratic Boolean Function -- Mutant Zhuang-Zi Algorithm -- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme -- Cryptanalysis of Code-Based Systems -- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes -- Grover vs. McEliece -- Information-Set Decoding for Linear Codes over F q -- A Timing Attack against the Secret Permutation in the McEliece PKC -- Practical Power Analysis Attacks on Software Implementations of McEliece -- Design of Encryption Schemes -- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials -- Designing a Rank Metric Based McEliece Cryptosystem -- Secure Variants of the Square Encryption Scheme -- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers -- Design of Signature Schemes -- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles -- Proposal of a Signature Scheme Based on STS Trapdoor -- Selecting Parameters for the Rainbow Signature Scheme.Security and Cryptology ;6061Data encryption (Computer science)Computer communication systemsManagement information systemsComputer scienceAlgorithmsComputer securityOperating systems (Computers)Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Darmstadt <2010>swdData encryption (Computer science).Computer communication systems.Management information systems.Computer science.Algorithms.Computer security.Operating systems (Computers).Cryptology.Computer Communication Networks.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.Systems and Data Security.Operating Systems.005.82Sendrier Nicolasedthttp://id.loc.gov/vocabulary/relators/edtPQCrypto 2010BOOK996465880003316Post-quantum cryptography230307UNISA