000 | 03652nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-642-12929-2 | ||
003 | DE-He213 | ||
005 | 20140220084536.0 | ||
007 | cr nn 008mamaa | ||
008 | 100531s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642129292 _9978-3-642-12929-2 |
||
024 | 7 |
_a10.1007/978-3-642-12929-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aSendrier, Nicolas. _eeditor. |
|
245 | 1 | 0 |
_aPost-Quantum Cryptography _h[electronic resource] : _bThird International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings / _cedited by Nicolas Sendrier. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
300 |
_aX, 241p. 27 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6061 |
|
505 | 0 | _aCryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic Applications -- Growth of the Ideal Generated by a Quadratic Boolean Function -- Mutant Zhuang-Zi Algorithm -- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme -- Cryptanalysis of Code-Based Systems -- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes -- Grover vs. McEliece -- Information-Set Decoding for Linear Codes over F q -- A Timing Attack against the Secret Permutation in the McEliece PKC -- Practical Power Analysis Attacks on Software Implementations of McEliece -- Design of Encryption Schemes -- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials -- Designing a Rank Metric Based McEliece Cryptosystem -- Secure Variants of the Square Encryption Scheme -- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers -- Design of Signature Schemes -- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles -- Proposal of a Signature Scheme Based on STS Trapdoor -- Selecting Parameters for the Rainbow Signature Scheme. | |
520 | _aThis book constitutes the refereed proceedings of the Third International Workshop on Post-Quantum Cryptography, PQCrypto 2010, held in Darmstadt, Germany, in May 2010. The 16 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on cryptanalysis of multivariate systems, cryptanalysis of code-based systems, design of encryption schemes, and design of signature schemes. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer software. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aOperating Systems. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642129285 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6061 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-12929-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 |
_c112162 _d112162 |