Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV046083713
    Format: 1 Online-Ressource (xiii, 418 Seiten) , Illustrationen, Diagramme
    ISBN: 9783030255107
    Series Statement: Lecture notes in computer science 11505
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-25509-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-25511-4
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Post-Quantum-Kryptografie ; Kryptosystem ; Kryptoanalyse ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948126280502882
    Format: XIII, 418 p. 581 illus., 18 illus. in color. , online resource.
    Edition: 1st ed. 2019.
    ISBN: 9783030255107
    Series Statement: Security and Cryptology ; 11505
    Content: This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Lattice-based Cryptography, Learning with Errors, Cryptanalysis, Key Establishment, Isogeny-based Cryptography, Hash-based cryptography, Code-based Cryptography.
    Note: Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030255091
    Additional Edition: Printed edition: ISBN 9783030255114
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1671003896
    Format: 1 Online-Ressource (XIII, 418 p. 581 illus., 18 illus. in color)
    Edition: 1st ed. 2019
    ISBN: 9783030255107
    Series Statement: Security and Cryptology 11505
    Content: Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
    Content: This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Lattice-based Cryptography, Learning with Errors, Cryptanalysis, Key Establishment, Isogeny-based Cryptography, Hash-based cryptography, Code-based Cryptography
    Additional Edition: ISBN 9783030255091
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-25509-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV046171063
    Format: xiii, 418 Seiten , Diagramme
    ISBN: 9783030255091
    Series Statement: Lecture notes in computer science 11505
    Additional Edition: Ercheint auch als Online-Ausgabe ISBN 978-3-030-25510-7
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Post-Quantum-Kryptografie ; Kryptosystem ; Kryptoanalyse ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783030250591?
Did you mean 9783030213091?
Did you mean 9783030055691?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages