Code-Based Cryptography 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29-30, 2022, Revised Selected Papers / [electronic resource] :
edited by Jean-Christophe Deneuville.
- 1st ed. 2023.
- IX, 155 p. 19 illus., 7 illus. in color. online resource.
- Lecture Notes in Computer Science, 13839 1611-3349 ; .
- Lecture Notes in Computer Science, 13839 .
Distinguishing and Recovering Generalized Linearized ReedSolomon Codes -- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation -- Key-Recovery Fault Injection Attack on the Classic McEliece KEM -- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC -- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes -- On Decoding High-Order Interleaved Sum-Rank-Metric Codes -- Information Set Decoding for Lee-Metric Codes using Restricted Balls -- Cryptanalysis of IvanovKroukZyablov cryptosystem .
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway. The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.
9783031296895
10.1007/978-3-031-29689-5 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Coding theory.
Information theory.
Data protection.
Computer networks--Security measures.
Cryptology.
Computer Communication Networks.
Coding and Information Theory.
Data and Information Security.
Mobile and Network Security.
QA268
005.824
Distinguishing and Recovering Generalized Linearized ReedSolomon Codes -- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation -- Key-Recovery Fault Injection Attack on the Classic McEliece KEM -- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC -- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes -- On Decoding High-Order Interleaved Sum-Rank-Metric Codes -- Information Set Decoding for Lee-Metric Codes using Restricted Balls -- Cryptanalysis of IvanovKroukZyablov cryptosystem .
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway. The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.
9783031296895
10.1007/978-3-031-29689-5 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Coding theory.
Information theory.
Data protection.
Computer networks--Security measures.
Cryptology.
Computer Communication Networks.
Coding and Information Theory.
Data and Information Security.
Mobile and Network Security.
QA268
005.824