LEADER 03417nam 22007095 450 001 9911007356803321 005 20250525130214.0 010 $a3-031-90229-7 024 7 $a10.1007/978-3-031-90229-1 035 $a(CKB)39124518300041 035 $a(DE-He213)978-3-031-90229-1 035 $a(MiAaPQ)EBC32130314 035 $a(Au-PeEL)EBL32130314 035 $a(EXLCZ)9939124518300041 100 $a20250525d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCode-Based Cryptography $e12th International Workshop, CBCrypto 2024, Zurich, Switzerland, May 25?26, 2024, Revised Selected Papers /$fedited by Violetta Weger, Jean-Christophe Deneuville, Anna-Lena Horlemann 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (IX, 111 p. 16 illus., 14 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15531 311 08$a3-031-90228-9 327 $a -- HQC Beyond the BSC: Towards Error Structure-Aware Decoding. -- Generalizing the Augot-Finiasz PKE to Other Code Classes. -- McEliece Parameter Sets Optimized for Processing in Memory Architectures. -- Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes. -- Increasing Index Sizes for Information Set Decoding Algorithms. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Code-Based Cryptography, CBCrypto 2024, held in Zurich, Switzerland, during May 25?26, 2024. The 5 full papers presented in this book were carefully reviewed and selected from 41 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15531 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer science$xMathematics 606 $aApplication software 606 $aData protection 606 $aCryptology 606 $aComputer Communication Networks 606 $aMathematics of Computing 606 $aComputer and Information Systems Applications 606 $aData and Information Security 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputer science$xMathematics. 615 0$aApplication software. 615 0$aData protection. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMathematics of Computing. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 676 $a005.824 702 $aWeger$b Violetta$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeneuville$b Jean-Christophe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHorlemann$b Anna-Lena$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007356803321 996 $aCode-Based Cryptography$93084061 997 $aUNINA