LEADER 04371nam 22008055 450 001 996465880003316 005 20230911201730.0 010 $a1-280-38644-4 010 $a9786613564368 010 $a3-642-12929-3 024 7 $a10.1007/978-3-642-12929-2 035 $a(CKB)2550000000011548 035 $a(SSID)ssj0000446695 035 $a(PQKBManifestationID)11282029 035 $a(PQKBTitleCode)TC0000446695 035 $a(PQKBWorkID)10504345 035 $a(PQKB)10221391 035 $a(DE-He213)978-3-642-12929-2 035 $a(MiAaPQ)EBC3065323 035 $a(PPN)149063229 035 $a(EXLCZ)992550000000011548 100 $a20100531d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPost-Quantum Cryptography$b[electronic resource] $eThird International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings /$fedited by Nicolas Sendrier 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 241 p. 27 illus.) 225 1 $aSecurity and Cryptology ;$v6061 300 $aIncludes index. 311 $a3-642-12928-5 327 $aCryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic Applications -- Growth of the Ideal Generated by a Quadratic Boolean Function -- Mutant Zhuang-Zi Algorithm -- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme -- Cryptanalysis of Code-Based Systems -- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes -- Grover vs. McEliece -- Information-Set Decoding for Linear Codes over F q -- A Timing Attack against the Secret Permutation in the McEliece PKC -- Practical Power Analysis Attacks on Software Implementations of McEliece -- Design of Encryption Schemes -- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials -- Designing a Rank Metric Based McEliece Cryptosystem -- Secure Variants of the Square Encryption Scheme -- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers -- Design of Signature Schemes -- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles -- Proposal of a Signature Scheme Based on STS Trapdoor -- Selecting Parameters for the Rainbow Signature Scheme. 410 0$aSecurity and Cryptology ;$v6061 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aOperating systems (Computers) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 607 $aDarmstadt <2010>$2swd 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aOperating systems (Computers). 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aOperating Systems. 676 $a005.82 702 $aSendrier$b Nicolas$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aPQCrypto 2010 906 $aBOOK 912 $a996465880003316 996 $aPost-quantum cryptography$9230307 997 $aUNISA