LEADER 03815nam 22006135 450 001 9910865238503321 005 20240701123242.0 010 $a9783031627460$b(electronic bk.) 010 $z9783031627453 024 7 $a10.1007/978-3-031-62746-0 035 $a(MiAaPQ)EBC31466814 035 $a(Au-PeEL)EBL31466814 035 $a(CKB)32273990100041 035 $a(DE-He213)978-3-031-62746-0 035 $a(OCoLC)1440848401 035 $a(EXLCZ)9932273990100041 100 $a20240610d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPost-Quantum Cryptography $e15th International Workshop, PQCrypto 2024, Oxford, UK, June 12?14, 2024, Proceedings, Part II /$fedited by Markku-Juhani Saarinen, Daniel Smith-Tone 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (380 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14772 311 08$aPrint version: Saarinen, Markku-Juhani Post-Quantum Cryptography Cham : Springer,c2024 9783031627453 327 $aIsogeny-Based Cryptography -- Adaptive attacks against FESTA without input validation or constant time implementation -- Updatable Encryption from Group Actions -- Fault Attack on SQIsign -- Multivariate Cryptography -- Cryptanalysis of the SNOVA Signature Scheme -- One vector to rule them all Key recovery from one vector in UOV schemes -- Polynomial XL A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings -- State of the art of HFE variants Is it possible to repair HFE with appropriate modifiers -- Practical key recovery attack on MQ Sign and more -- Practical and Theoretical Cryptanalysis of VOX.-Quantum Algorithms -- Extending Regevs Factoring Algorithm to Compute Discrete Logarithms -- Transforms and Proofs -- A note on Failing gracefully Completing the picture for explicitly rejecting Fujisaki Okamoto transforms using worst case correctness -- Two Round Threshold Lattice Based Signatures from Threshold Homomorphic Encryption -- Hash your Keys before Signing BUFF Security of the Additional NIST PQC Signatures -- Revisiting Anonymity in Post Quantum Public Key Encryption. 330 $aThe two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12?14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14772 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aComputer networks 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 676 $a5,824 700 $aSaarinen$b Markku-Juhani$01742102 701 $aSmith-Tone$b Daniel$01396977 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910865238503321 996 $aPost-Quantum Cryptography$94168703 997 $aUNINA