LEADER 03591nam 22006015 450 001 996650068703316 005 20250324115255.0 010 $a3-031-86599-5 024 7 $a10.1007/978-3-031-86599-2 035 $a(CKB)38111239800041 035 $a(DE-He213)978-3-031-86599-2 035 $a(MiAaPQ)EBC31974438 035 $a(Au-PeEL)EBL31974438 035 $a(EXLCZ)9938111239800041 100 $a20250324d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPost-Quantum Cryptography $e16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8?10, 2025, Proceedings, Part I /$fedited by Ruben Niederhagen, Markku-Juhani O. Saarinen 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XIV, 386 p. 44 illus., 15 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15577 311 08$a3-031-86598-7 327 $a -- Code-Based Cryptography. -- On the Structure of the Schur Squares of Twisted Generalized Reed-Solomon Codes and Application to Cryptanalysis. -- Quadratic Modelings of Syndrome Decoding. -- An Improved Algorithm for Code Equivalence. -- An Improved Both-May Information Set Decoding Algorithm: Towards More Efficient Time-Memory Trade-Offs. -- Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements. -- Multivariate Cryptography. -- Share the MAYO: Thresholdizing MAYO. -- SoK: On the Physical Security of UOV-based Signature Schemes. -- Shifting our Knowledge of MQ-Sign Security. -- Lattice-Based Cryptography. -- Module Learning With Errors With Truncated Matrices. -- Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More. -- Giant Does NOT Mean Strong: Cryptanalysis of BQTRU. -- Batch Anonymous MAC Tokens from Lattices. 330 $aThe two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025, held in Taipei, Taiwan, during April 8?10, 2025. The 25 full papers presented in the proceedings were carefully selected and reviewed from 59 submissions. The papers have been organized in the following topical sections: Part I: Code-Based Cryptography; Multivariate Cryptography; Lattice-Based Cryptography. Part II: Isogeny-Based Cryptography; Cryptanalysis; Quantum Security; Side-Channel Attacks; Security Notions. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15577 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aComputer networks 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 676 $a005.824 702 $aNiederhagen$b Ruben$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSaarinen$b Markku-Juhani O$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996650068703316 996 $aPost-quantum cryptography$9230307 997 $aUNISA