LEADER 03846nam 22008295 450 001 996466263003316 005 20200706184901.0 010 $a3-642-25405-5 024 7 $a10.1007/978-3-642-25405-5 035 $a(CKB)3390000000021984 035 $a(SSID)ssj0000610570 035 $a(PQKBManifestationID)11423403 035 $a(PQKBTitleCode)TC0000610570 035 $a(PQKBWorkID)10639429 035 $a(PQKB)11667135 035 $a(DE-He213)978-3-642-25405-5 035 $a(MiAaPQ)EBC6295099 035 $a(MiAaPQ)EBC5577399 035 $a(Au-PeEL)EBL5577399 035 $a(OCoLC)765959776 035 $a(PPN)157511928 035 $a(EXLCZ)993390000000021984 100 $a20111124d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPost-Quantum Cryptography$b[electronic resource] $e4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011, Proceedings /$fedited by Bo-Yin Yang 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (X, 295 p. 30 illus.) 225 1 $aSecurity and Cryptology ;$v7071 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-25404-7 330 $aThis book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011. The 18 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems that have the potential to resist possible future quantum computers, classical and quantum attacks, and security models for the post-quantum era. 410 0$aSecurity and Cryptology ;$v7071 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aYang$b Bo-Yin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466263003316 996 $aPost-quantum cryptography$9230307 997 $aUNISA