000 04360nam a22006255i 4500
001 978-3-030-25510-7
003 DE-He213
005 20240423125011.0
007 cr nn 008mamaa
008 190713s2019 sz | s |||| 0|eng d
020 _a9783030255107
_9978-3-030-25510-7
024 7 _a10.1007/978-3-030-25510-7
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aPost-Quantum Cryptography
_h[electronic resource] :
_b10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers /
_cedited by Jintai Ding, Rainer Steinwandt.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXIII, 418 p. 581 illus., 18 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11505
505 0 _aFinding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.
520 _aThis book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Lattice-based Cryptography, Learning with Errors, Cryptanalysis, Key Establishment, Isogeny-based Cryptography, Hash-based cryptography, Code-based Cryptography.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 0 _aComputers.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 1 4 _aCryptology.
650 2 4 _aData and Information Security.
650 2 4 _aComputing Milieux.
650 2 4 _aComputer Engineering and Networks.
700 1 _aDing, Jintai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSteinwandt, Rainer.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030255091
776 0 8 _iPrinted edition:
_z9783030255114
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11505
856 4 0 _uhttps://doi.org/10.1007/978-3-030-25510-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c173099
_d173099