top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Post-Quantum Cryptography [[electronic resource] ] : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings / / edited by Thomas Johansson, Daniel Smith-Tone
Post-Quantum Cryptography [[electronic resource] ] : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings / / edited by Thomas Johansson, Daniel Smith-Tone
Autore Johansson Thomas
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (715 pages)
Disciplina 005.824
Altri autori (Persone) Smith-ToneDaniel
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Application software
Computer networks
Cryptology
Computer and Information Systems Applications
Computer Communication Networks
ISBN 3-031-40003-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Code-Based Cryptography -- Group-Action-Based Cryptography -- Isogenye-Based Cryptography -- Lattice-Based Cryptography -- Multivariate Cryptography -- Quantum Algorithms, Cryptanalysis and Models -- Post-Quantum Protocols -- Side Channel Cryptanalysis and Countermeasures.
Record Nr. UNISA-996546854603316
Johansson Thomas  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings / / edited by Thomas Johansson, Daniel Smith-Tone
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings / / edited by Thomas Johansson, Daniel Smith-Tone
Autore Johansson Thomas
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (715 pages)
Disciplina 005.824
Altri autori (Persone) Smith-ToneDaniel
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Application software
Computer networks
Cryptology
Computer and Information Systems Applications
Computer Communication Networks
ISBN 9783031400032
3031400038
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Code-Based Cryptography -- Group-Action-Based Cryptography -- Isogenye-Based Cryptography -- Lattice-Based Cryptography -- Multivariate Cryptography -- Quantum Algorithms, Cryptanalysis and Models -- Post-Quantum Protocols -- Side Channel Cryptanalysis and Countermeasures.
Record Nr. UNINA-9910741161003321
Johansson Thomas  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II / / edited by Markku-Juhani Saarinen, Daniel Smith-Tone
Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II / / edited by Markku-Juhani Saarinen, Daniel Smith-Tone
Autore Saarinen Markku-Juhani
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (380 pages)
Disciplina 5,824
Altri autori (Persone) Smith-ToneDaniel
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Application software
Computer networks
Cryptology
Computer and Information Systems Applications
Computer Communication Networks
ISBN 9783031627460
9783031627453
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Isogeny-Based Cryptography -- Adaptive attacks against FESTA without input validation or constant time implementation -- Updatable Encryption from Group Actions -- Fault Attack on SQIsign -- Multivariate Cryptography -- Cryptanalysis of the SNOVA Signature Scheme -- One vector to rule them all Key recovery from one vector in UOV schemes -- Polynomial XL A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings -- State of the art of HFE variants Is it possible to repair HFE with appropriate modifiers -- Practical key recovery attack on MQ Sign and more -- Practical and Theoretical Cryptanalysis of VOX.-Quantum Algorithms -- Extending Regevs Factoring Algorithm to Compute Discrete Logarithms -- Transforms and Proofs -- A note on Failing gracefully Completing the picture for explicitly rejecting Fujisaki Okamoto transforms using worst case correctness -- Two Round Threshold Lattice Based Signatures from Threshold Homomorphic Encryption -- Hash your Keys before Signing BUFF Security of the Additional NIST PQC Signatures -- Revisiting Anonymity in Post Quantum Public Key Encryption.
Record Nr. UNINA-9910865238503321
Saarinen Markku-Juhani  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I / / edited by Markku-Juhani Saarinen, Daniel Smith-Tone
Post-Quantum Cryptography : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I / / edited by Markku-Juhani Saarinen, Daniel Smith-Tone
Autore Saarinen Markku-Juhani
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (440 pages)
Disciplina 5,824
Altri autori (Persone) Smith-ToneDaniel
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Application software
Computer networks
Cryptology
Computer and Information Systems Applications
Computer Communication Networks
ISBN 9783031627439
9783031627422
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applications and Protocols -- Post Quantum Secure ZRTP -- A New Hash-based Enhanced Privacy ID Signature Scheme -- Code Based Cryptography -- The Blockwise Rank Syndrome Learning problem and its applications to cryptography -- Reducing Signature Size of Matrix code based Signature Schemes -- Group-Action-Based Cryptography -- CCA Secure Updatable Encryption from Non Mappable Group Actions -- Properties of Lattice Isomorphism as a Cryptographic Group Action -- A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem -- On digital signatures based on group actions QROM security and ring signatures -- Lattice-Based Cryptography -- Phoenix Hash and Sign with Aborts from Lattice Gagdets -- Efficient Identity Based Encryption with Tight Adaptive Anonymity from RLWE -- An Improved Practical Key Mismatch Attack Against NTRU -- Improved Provable Reduction of NTRU and Hypercubic Lattices -- Compact Encryption based on Module NTRU problems -- Analyzing Pump and jump BKZ algorithm using dynamical systems.
Record Nr. UNINA-9910865255803321
Saarinen Markku-Juhani  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Report on post-quantum cryptography / / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone
Report on post-quantum cryptography / / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone
Autore Chen Lily
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016
Descrizione fisica 1 online resource (15 pages) : illustrations (black and white)
Altri autori (Persone) ChenLily
JordanStephen
LiuYi-Kai
MoodyDustin
PeraltaRené
PerlnerRay
Smith-ToneDaniel
Collana NISTIR
Soggetto topico Public key cryptography
Quantum computing
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910709596903321
Chen Lily  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui