Post-Quantum Cryptography [E-Book] : 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings / edited by Jung Hee Cheon, Jean-Pierre Tillich.
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of re...
Saved in:
Full text |
|
Personal Name(s): | Cheon, Jung Hee, editor |
Tillich, Jean-Pierre, editor | |
Edition: |
1st edition 2021. |
Imprint: |
Cham :
Springer,
2021
|
Physical Description: |
XIII, 500 pages 73 illustrations, 20 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030812935 |
DOI: |
10.1007/978-3-030-81293-5 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Security and Cryptology ;
12841 /* Depending on the record driver, $field may either be an array with "name" and "number" keys or a flat string containing only the series name. We should account for both cases to maximize compatibility. */?> Lecture Notes in Computer Science |
Subject (LOC): |
LEADER | 04110nam a22004335i 4500 | ||
---|---|---|---|
001 | 978-3-030-81293-5 | ||
003 | Springer | ||
008 | 210714s2021 gw | s |||| 0|eng d | ||
020 | |a 9783030812935 | ||
024 | 7 | |a 10.1007/978-3-030-81293-5 |2 doi | |
035 | |a (Sirsi) a858467 | ||
041 | |a eng | ||
082 | 0 | 4 | |a 005.82 |2 23 |
245 | 1 | 0 | |a Post-Quantum Cryptography |h [E-Book] : |b 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings / |c edited by Jung Hee Cheon, Jean-Pierre Tillich. |
250 | |a 1st edition 2021. | ||
264 | 1 | |a Cham : |b Springer, |c 2021 |e (Springer LINK) |f SpringerComputerScience20210721 | |
300 | |a XIII, 500 pages 73 illustrations, 20 illustrations in color (online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | |a Security and Cryptology ; |v 12841 | ||
490 | |a Lecture Notes in Computer Science | ||
500 | |a englisch | ||
505 | 0 | |a Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric -- Multivariate Cryptography -- Improving Thomae-Wolf Algorithm for Solving Underdetermined -- Multivariate Quadratic Polynomial Problem -- New Practical Multivariate Signatures from a Nonlinear Modifier -- On the Effect of Projection on Rank Attacks in Multivariate Cryptography -- Quantum Algorithms -- Quantum Key Search for Ternary LWE -- A fusion algorithm for solving the hidden shift problem in finite abelian groups -- The "quantum annoying" property of password-authenticated key exchange protocols -- Implementation and Side channel attack -- Differential Power Analysis of the Picnic Signature Scheme -- Implementation of Lattice Trapdoors on Modules and Applications -- Verifying Post-Quantum Signatures in 8 KiB of RAM -- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists -- Isogeny -- CSI-RAShi: Distributed key generation for CSIDH -- SimS: a Simplification of SiGamal -- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE -- Lattice-Based Cryptography -- Generating cryptographically-strong random lattice bases and recognizing rotations of Z -- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions -- Short Identity-Based Signatures with Tight Security from Lattices -- On Removing Rejection Conditions in Practical Lattice-Based Signatures -- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems -- Cryptanalysis -- Attack on Beyond-Birthday-Bound MACs in Quantum Setting -- An algebraic approach to the Rank Support Learning problem -- Quantum Indistinguishability for Public Key Encryption -- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. | |
520 | |a This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. | ||
650 | 0 | |a Computer communication systems. | |
650 | 0 | |a Computer organization. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data encryption (Computer science). | |
700 | 1 | |a Cheon, Jung Hee, |e editor | |
700 | 1 | |a Tillich, Jean-Pierre, |e editor | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-81293-5 |z Volltext |
908 | |a Konferenz | ||
915 | |a zzwFZJ3 | ||
932 | |a Computer Science (R0) (SpringerNature-43710) | ||
932 | |a Computer Science (SpringerNature-11645) | ||
596 | |a 1 | ||
949 | |a XX(858467.1) |w AUTO |c 1 |i 858467-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 21/7/2021 |x ZB-D |z UNKNOWN |0 NEL |1 ONLINE |2 KONFERENZ |