LEADER 02798nam 2200541 a 450 001 9910484277803321 005 20200520144314.0 010 $a1-280-38644-4 010 $a9786613564368 010 $a3-642-12929-3 024 7 $a10.1007/978-3-642-12929-2 035 $a(CKB)2550000000011548 035 $a(SSID)ssj0000446695 035 $a(PQKBManifestationID)11282029 035 $a(PQKBTitleCode)TC0000446695 035 $a(PQKBWorkID)10504345 035 $a(PQKB)10221391 035 $a(DE-He213)978-3-642-12929-2 035 $a(MiAaPQ)EBC3065323 035 $a(PPN)149063229 035 $a(EXLCZ)992550000000011548 100 $a20100407d2010 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPost-quantum cryptography $ethird international workshop, PQcrypto 2010, Darmstadt, Germany, May 25-28, 2010. proceedings /$fNicolas Sendrier (ed.) 205 $a1st ed. 210 $aNew York $cSpringer$d2010 215 $a1 online resource (X, 241 p. 27 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6061 300 $aIncludes index. 311 $a3-642-12928-5 327 $aCryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic Applications -- Growth of the Ideal Generated by a Quadratic Boolean Function -- Mutant Zhuang-Zi Algorithm -- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme -- Cryptanalysis of Code-Based Systems -- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes -- Grover vs. McEliece -- Information-Set Decoding for Linear Codes over F q -- A Timing Attack against the Secret Permutation in the McEliece PKC -- Practical Power Analysis Attacks on Software Implementations of McEliece -- Design of Encryption Schemes -- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials -- Designing a Rank Metric Based McEliece Cryptosystem -- Secure Variants of the Square Encryption Scheme -- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers -- Design of Signature Schemes -- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles -- Proposal of a Signature Scheme Based on STS Trapdoor -- Selecting Parameters for the Rainbow Signature Scheme. 410 0$aLecture notes in computer science. 606 $aComputers$xCryptography 615 0$aComputers$xCryptography. 676 $a005.82 701 $aSendrier$b Nicolas$01755759 712 12$aPQCrypto 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484277803321 996 $aPost-quantum cryptography$94192666 997 $aUNINA