LEADER 03563nam 22007095 450 001 996418219303316 005 20200704155851.0 010 $a3-030-44223-3 024 7 $a10.1007/978-3-030-44223-1 035 $a(CKB)4100000011223231 035 $a(MiAaPQ)EBC6302156 035 $a(DE-He213)978-3-030-44223-1 035 $a(PPN)243760914 035 $a(EXLCZ)994100000011223231 100 $a20200326d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPost-Quantum Cryptography$b[electronic resource] $e11th International Conference, PQCrypto 2020, Paris, France, April 15?17, 2020, Proceedings /$fedited by Jintai Ding, Jean-Pierre Tillich 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (xiii, 560 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v12100 311 $a3-030-44222-5 320 $aIncludes bibliographical references and index. 327 $aCode-based cryptography -- Implementation -- Isogeny-based cryptography -- Lattice-based cryptography -- Multivariate cryptography -- Quantum algorithms -- Security proofs. 330 $aThis volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. 410 0$aSecurity and Cryptology ;$v12100 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputer networks$xSecurity measures 606 $aComputers 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 615 0$aComputers. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aSecurity Services. 615 24$aSystems and Data Security. 615 24$aMobile and Network Security. 615 24$aInformation Systems and Communication Service. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aDing$b Jintai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTillich$b Jean-Pierre$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418219303316 996 $aPost-quantum cryptography$9230307 997 $aUNISA