Post-Quantum Cryptography [E-Book] : 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II / edited by Markku-Juhani Saarinen, Daniel Smith-Tone.
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized...
Saved in:
Full text |
|
Personal Name(s): | Saarinen, Markku-Juhani, editor |
Smith-Tone, Daniel, editor | |
Edition: |
1st edition 2024. |
Imprint: |
Cham :
Springer,
2024
|
Physical Description: |
XII, 372 pages 69 illustrations, 11 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783031627460 |
DOI: |
10.1007/978-3-031-62746-0 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Computer Science ;
14772 |
Subject (LOC): |
LEADER | 03288nam a22004215i 4500 | ||
---|---|---|---|
001 | 978-3-031-62746-0 | ||
003 | Springer | ||
008 | 240610s2024 sz | s |||| 0|eng d | ||
020 | |a 9783031627460 | ||
024 | 7 | |a 10.1007/978-3-031-62746-0 |2 doi | |
035 | |a (Sirsi) a890819 | ||
041 | |a eng | ||
082 | 0 | 4 | |a 5,824 |2 23 |
245 | 1 | 0 | |a Post-Quantum Cryptography |h [E-Book] : |b 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II / |c edited by Markku-Juhani Saarinen, Daniel Smith-Tone. |
250 | |a 1st edition 2024. | ||
264 | 1 | |a Cham : |b Springer, |c 2024 |e (Springer LINK) |f SpringerLectureNotes20240701 | |
300 | |a XII, 372 pages 69 illustrations, 11 illustrations in color (online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | |a Lecture Notes in Computer Science ; |v 14772 | ||
500 | |a englisch | ||
505 | 0 | |a Isogeny-Based Cryptography -- Adaptive attacks against FESTA without input validation or constant time implementation -- Updatable Encryption from Group Actions -- Fault Attack on SQIsign -- Multivariate Cryptography -- Cryptanalysis of the SNOVA Signature Scheme -- One vector to rule them all Key recovery from one vector in UOV schemes -- Polynomial XL A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings -- State of the art of HFE variants Is it possible to repair HFE with appropriate modifiers -- Practical key recovery attack on MQ Sign and more -- Practical and Theoretical Cryptanalysis of VOX.-Quantum Algorithms -- Extending Regevs Factoring Algorithm to Compute Discrete Logarithms -- Transforms and Proofs -- A note on Failing gracefully Completing the picture for explicitly rejecting Fujisaki Okamoto transforms using worst case correctness -- Two Round Threshold Lattice Based Signatures from Threshold Homomorphic Encryption -- Hash your Keys before Signing BUFF Security of the Additional NIST PQC Signatures -- Revisiting Anonymity in Post Quantum Public Key Encryption. | |
520 | |a The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs. | ||
650 | 0 | |a Application software. | |
650 | 0 | |a Computer networks . | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science). | |
700 | 1 | |a Saarinen, Markku-Juhani, |e editor | |
700 | 1 | |a Smith-Tone, Daniel, |e editor | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-62746-0 |z Volltext |
908 | |a Konferenz | ||
915 | |a zzwFZJ3 | ||
932 | |a Computer Science (R0) (SpringerNature-43710) | ||
932 | |a Computer Science (SpringerNature-11645) | ||
596 | |a 1 | ||
949 | |a XX(890819.1) |w AUTO |c 1 |i 890819-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 1/7/2024 |x ZB-D |z UNKNOWN |0 NEL |1 ONLINE |2 KONFERENZ |