Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings /

Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings / [electronic resource] : edited by Nicolas Sendrier. - 1st ed. 2010. - X, 241 p. 27 illus. online resource. - Security and Cryptology, 6061 2946-1863 ; . - Security and Cryptology, 6061 .

Cryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic Applications -- Growth of the Ideal Generated by a Quadratic Boolean Function -- Mutant Zhuang-Zi Algorithm -- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme -- Cryptanalysis of Code-Based Systems -- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes -- Grover vs. McEliece -- Information-Set Decoding for Linear Codes over F q -- A Timing Attack against the Secret Permutation in the McEliece PKC -- Practical Power Analysis Attacks on Software Implementations of McEliece -- Design of Encryption Schemes -- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials -- Designing a Rank Metric Based McEliece Cryptosystem -- Secure Variants of the Square Encryption Scheme -- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers -- Design of Signature Schemes -- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles -- Proposal of a Signature Scheme Based on STS Trapdoor -- Selecting Parameters for the Rainbow Signature Scheme.

9783642129292

10.1007/978-3-642-12929-2 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Electronic data processing--Management.
Algorithms.
Data protection.
Operating systems (Computers).
Cryptology.
Computer Communication Networks.
IT Operations.
Algorithms.
Data and Information Security.
Operating Systems.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in