LEADER 03727nam 22007935 450 001 996199682503316 005 20200702082153.0 010 $a3-319-11659-2 024 7 $a10.1007/978-3-319-11659-4 035 $a(CKB)3710000000249776 035 $a(SSID)ssj0001354246 035 $a(PQKBManifestationID)11732966 035 $a(PQKBTitleCode)TC0001354246 035 $a(PQKBWorkID)11322659 035 $a(PQKB)11573541 035 $a(DE-He213)978-3-319-11659-4 035 $a(MiAaPQ)EBC6297367 035 $a(MiAaPQ)EBC5591554 035 $a(Au-PeEL)EBL5591554 035 $a(OCoLC)892338732 035 $a(PPN)181352052 035 $a(EXLCZ)993710000000249776 100 $a20140925d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPost-Quantum Cryptography$b[electronic resource] $e6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings /$fedited by Michele Mosca 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (X, 284 p. 33 illus.) 225 1 $aSecurity and Cryptology ;$v8772 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-11658-4 327 $aCode-based cryptography -- Lattice-based cryptography -- Multivariate cryptography -- Isogeny-based cryptography -- Security proof frameworks -- Cryptanalysis and implementations. 330 $aThis book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations. 410 0$aSecurity and Cryptology ;$v8772 606 $aData encryption (Computer science) 606 $aComputer security 606 $aQuantum computers 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aQuantum Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/M14070 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aQuantum computers. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aQuantum Computing. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.82 702 $aMosca$b Michele$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996199682503316 996 $aPost-quantum cryptography$9230307 997 $aUNISA