Post-Quantum Cryptography [[electronic resource] ] : 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings / / edited by Jintai Ding, Jean-Pierre Tillich |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xiii, 560 pages) : illustrations |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer networks - Security measures Computers Computer communication systems Cryptology Security Services Systems and Data Security Mobile and Network Security Information Systems and Communication Service Computer Communication Networks |
ISBN | 3-030-44223-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Code-based cryptography -- Implementation -- Isogeny-based cryptography -- Lattice-based cryptography -- Multivariate cryptography -- Quantum algorithms -- Security proofs. |
Record Nr. | UNISA-996418219303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Post-Quantum Cryptography : 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings / / edited by Jintai Ding, Jean-Pierre Tillich |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xiii, 560 pages) : illustrations |
Disciplina |
005.82
005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer networks - Security measures Computers Computer communication systems Cryptology Security Services Systems and Data Security Mobile and Network Security Information Systems and Communication Service Computer Communication Networks |
ISBN | 3-030-44223-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Code-based cryptography -- Implementation -- Isogeny-based cryptography -- Lattice-based cryptography -- Multivariate cryptography -- Quantum algorithms -- Security proofs. |
Record Nr. | UNINA-9910409674003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Post-Quantum Cryptography [[electronic resource] ] : 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers / / edited by Jintai Ding, Rainer Steinwandt |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 418 p. 581 illus., 18 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data protection Computers Computer organization Cryptology Security Computing Milieux Computer Systems Organization and Communication Networks |
ISBN | 3-030-25510-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders. |
Record Nr. | UNISA-996466183003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Post-Quantum Cryptography : 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers / / edited by Jintai Ding, Rainer Steinwandt |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 418 p. 581 illus., 18 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data protection Computers Computer organization Cryptology Security Computing Milieux Computer Systems Organization and Communication Networks |
ISBN | 3-030-25510-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders. |
Record Nr. | UNINA-9910349311503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Post-quantum cryptography : second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings / / [edited by] Johannes Buchmann, Jintai Ding |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (X, 231 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) |
ISBN | 3-540-88403-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. |
Record Nr. | UNINA-9910483046403321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Post-quantum cryptography : second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings / / [edited by] Johannes Buchmann, Jintai Ding |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (X, 231 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) |
ISBN | 3-540-88403-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. |
Record Nr. | UNISA-996465577503316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|