000 | 04254nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-540-88403-3 | ||
003 | DE-He213 | ||
005 | 20240730202223.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2008 gw | s |||| 0|eng d | ||
020 |
_a9783540884033 _9978-3-540-88403-3 |
||
024 | 7 |
_a10.1007/978-3-540-88403-3 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aPost-Quantum Cryptography _h[electronic resource] : _bSecond International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings / _cedited by Johannes Buchmann, Jintai Ding. |
250 | _a1st ed. 2008. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2008. |
|
300 |
_aX, 231 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v5299 |
|
505 | 0 | _aA New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. | |
520 | _aThis book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aUser interfaces (Computer systems). _911681 |
|
650 | 0 |
_aHuman-computer interaction. _96196 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9170443 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aUser Interfaces and Human Computer Interaction. _931632 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer Communication Networks. _9170444 |
700 | 1 |
_aBuchmann, Johannes. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9170445 |
|
700 | 1 |
_aDing, Jintai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9170446 |
|
710 | 2 |
_aSpringerLink (Online service) _9170447 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540884026 |
776 | 0 | 8 |
_iPrinted edition: _z9783540890379 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v5299 _9170448 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-88403-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96908 _d96908 |