Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Conference PQCrypto (Conference) (3rd : 2010 : Darmstadt, Germany)
Title Post-quantum cryptography : third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 ; proceedings / Nicolas Sendrier (ed.).
Imprint Berlin : Springer, 2010.

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
Conference PQCrypto (Conference) (3rd : 2010 : Darmstadt, Germany)
Series Lecture notes in computer science, 0302-9743 ; 6061
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6061.
LNCS sublibrary. SL 4, Security and cryptology.
Subject Data encryption (Computer science) -- Congresses.
Cryptography -- Congresses.
Computer Security.
Alt Name Sendrier, Nicolas.
Description 1 online resource (x, 240 pages) : illustrations.
polychrome rdacc
Bibliography Note Includes bibliographical references.
Contents Cryptanalysis of multivariate systems. Properties of the discrete differential with cryptographic applications / Daniel Smith-Tone -- Growth of the ideal generated by a quadratic Boolean function / Jintai Ding, Timothy J. Hodges, and Victoria Kruglov -- Mutant Zhuang-Zi algorithm / Jintai Ding and Dieter S. Schmidt -- Cryptanalysis of two quartic encryption schemes and one improved MFE scheme / Weiwei Cao, Xiuyun Nie, Lei Hu, Xiling Tang, and Jintai Ding -- Cryptanalysis of code-based systems. Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes / Christian Wieschebrink -- Grover vs. McEliece / Daniel J. Bernstein -- Information-set decoding for linear codes over Fq / Christiane Peters -- A timing attack against the secret permutation in the McEliece PKC / Falko Strenzke -- Practical power analysis attacks on software implementations of McEliece / Stefan Heyse, Amir Moradi, and Christof Paar -- Design of encryption schemes. Key exchange and encryption schemes based on non-commutative skew polynomials / Delphine Boucher, Philippe Gaborit, Willi Geiselmann, Olivier Ruatta, and Felix Ulmer -- Designing a rank metric based McEliece cryptosystem / Pierre Loidreau -- Secure variants of the square encryption scheme / Crystal Lee Clough and Jintai Ding -- Low-Reiter : Niederreiter encryption scheme for embedded microcontrollers / Stefan Heyse -- Design of signature schemes. Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles / Markus Ruckert -- Proposal of a signature scheme based on STS trapdoor / Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, and Ryo Fujita -- Selecting parameters for the Rainbow signature scheme / Albrecht Petzoldt, Stanislav Bulygin, and Johannes Buchmann.
Summary Annotation This book constitutes the refereed proceedings of the Third International Workshop on Post-Quantum Cryptography, PQCrypto 2010, held in Darmstadt, Germany, in May 2010. The 16 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on cryptanalysis of multivariate systems, cryptanalysis of code-based systems, design of encryption schemes, and design of signature schemes.
Note Print version record.
ISBN 9783642129292
3642129293
9783642129285 (pbk.)
3642129285 (pbk.)
OCLC # 654398651
Additional Format Print version: PQCrypto 2010 (2010 : Darmstadt, Germany). Post-quantum cryptography. Berlin : Springer, 2010 9783642129285 3642129285 (OCoLC)635376211


If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team