000 | 03905nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-642-38616-9 | ||
003 | DE-He213 | ||
005 | 20240730190346.0 | ||
007 | cr nn 008mamaa | ||
008 | 130605s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642386169 _9978-3-642-38616-9 |
||
024 | 7 |
_a10.1007/978-3-642-38616-9 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aPost-Quantum Cryptography _h[electronic resource] : _b5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings / _cedited by Philippe Gaborit. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aX, 259 p. 17 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7932 |
|
505 | 0 | _aUsing LDGM Codes and Sparse Syndromes to Achieve Digital Signatures -- Quantum Algorithms for the Subset-Sum Problem -- Improved Lattice-Based Threshold Ring Signature Scheme -- Degree of Regularity for HFEv and HFEv- -- Software Speed Records for Lattice-Based Signatures -- Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search -- An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional -- Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations -- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework -- Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme -- A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems -- Secure and Anonymous Hybrid Encryption from Coding Theory -- Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes -- The Hardness of Code Equivalence over Fq and Its Application to Code-Based Cryptography -- Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems -- Simple Matrix Scheme for Encryption -- Multivariate Signature Scheme Using Quadratic Forms. | |
520 | _aThis book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aQuantum computers. _93985 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9142186 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aQuantum Computing. _910080 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aGaborit, Philippe. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9142187 |
|
710 | 2 |
_aSpringerLink (Online service) _9142188 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642386152 |
776 | 0 | 8 |
_iPrinted edition: _z9783642386176 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7932 _9142189 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-38616-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93209 _d93209 |