Post-quantum cryptography = 13th Int...
PQCrypto (Conference) (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Post-quantum cryptography = 13th International Workshop, PQCrypto 2022, virtual event, September 28-30, 2022 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Post-quantum cryptography/ edited by Jung Hee Cheon, Thomas Johansson.
    Reminder of title: 13th International Workshop, PQCrypto 2022, virtual event, September 28-30, 2022 : proceedings /
    remainder title: PQCrypto 2022
    other author: Cheon, Jung Hee.
    corporate name: PQCrypto (Conference)
    Published: Cham :Springer International Publishing : : 2022.,
    Description: xi, 523 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Code-Based Cryptography -- Hybrid Decoding - Classical-Quantum Trade-O s for Information Set Decoding -- How to Backdoor (Classic) McEliece and How to Guard Against Backdoors -- LRPC codes with multiple syndromes: near ideal-size KEMs without ideals -- Interleaved Prange: A New Generic Decoder for Interleaved Codes -- A Study of Error Floor Behavior in QC-MDPC Codes -- Multivariate Cryptography and the MinRank Problem -- Improvement of algebraic attacks for superdetermined MinRank -- A New Fault Attack on UOV Multivariate Signature Scheme -- MR-DSS - Smaller MinRank-based (Ring-)Signatures -- IPRainbow -- 2F - A New Method for Constructing E cient Multivariate Encryption Schemes -- Quantum Algorithms, Attacks and Models -- Quantum Attacks on Lai-Massey Structure -- Sponge-based Authenticated Encryption: Security against Quantum Attackers -- Post-quantum Plaintext-awareness -- On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP -- Implementation and Side channel attacks -- Effciently Masking Polynomial Inversion at Arbitrary Order -- A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem -- A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext -- Isogeny -- On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions -- Attack on SHealS and HealS: the Second Wave of GPST -- Post-Quantum Signal Key Agreement from SIDH -- Lattice-Based Cryptography -- Forward-Secure Revocable Secret Handshakes from Lattices -- Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm -- Cryptanalysis -- Breaking Category Five SPHINCS+ with SHA-256.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-17234-2
    ISBN: 9783031172342
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9445522 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 P63 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login