LEADER 03735nam 22006135 450 001 9910865255803321 005 20240702114213.0 010 $a9783031627439$b(electronic bk.) 010 $z9783031627422 024 7 $a10.1007/978-3-031-62743-9 035 $a(MiAaPQ)EBC31466799 035 $a(Au-PeEL)EBL31466799 035 $a(CKB)32274076100041 035 $a(DE-He213)978-3-031-62743-9 035 $a(OCoLC)1440812479 035 $a(EXLCZ)9932274076100041 100 $a20240611d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPost-Quantum Cryptography $e15th International Workshop, PQCrypto 2024, Oxford, UK, June 12?14, 2024, Proceedings, Part I /$fedited by Markku-Juhani Saarinen, Daniel Smith-Tone 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (440 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14771 311 08$aPrint version: Saarinen, Markku-Juhani Post-Quantum Cryptography Cham : Springer,c2024 9783031627422 327 $aApplications and Protocols -- Post Quantum Secure ZRTP -- A New Hash-based Enhanced Privacy ID Signature Scheme -- Code Based Cryptography -- The Blockwise Rank Syndrome Learning problem and its applications to cryptography -- Reducing Signature Size of Matrix code based Signature Schemes -- Group-Action-Based Cryptography -- CCA Secure Updatable Encryption from Non Mappable Group Actions -- Properties of Lattice Isomorphism as a Cryptographic Group Action -- A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem -- On digital signatures based on group actions QROM security and ring signatures -- Lattice-Based Cryptography -- Phoenix Hash and Sign with Aborts from Lattice Gagdets -- Efficient Identity Based Encryption with Tight Adaptive Anonymity from RLWE -- An Improved Practical Key Mismatch Attack Against NTRU -- Improved Provable Reduction of NTRU and Hypercubic Lattices -- Compact Encryption based on Module NTRU problems -- Analyzing Pump and jump BKZ algorithm using dynamical systems. 330 $aThe two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12?14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14771 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aComputer networks 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 676 $a5,824 700 $aSaarinen$b Markku-Juhani$01742102 701 $aSmith-Tone$b Daniel$01396977 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910865255803321 996 $aPost-Quantum Cryptography$94168703 997 $aUNINA