Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Post-Quantum Cryptography

15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part I
BuchKartoniert, Paperback
434 Seiten
Englisch
Springererschienen am11.06.20242024
âThe two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024.The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. code-based cryptography; group-action-based cryptography;mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR79,17
BuchKartoniert, Paperback
EUR70,61
E-BookPDF1 - PDF WatermarkE-Book
EUR139,09

Produkt

KlappentextâThe two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024.The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. code-based cryptography; group-action-based cryptography;
Details
ISBN/GTIN978-3-031-62742-2
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2024
Erscheinungsdatum11.06.2024
Auflage2024
Seiten434 Seiten
SpracheEnglisch
Gewicht675 g
IllustrationenXII, 434 p. 68 illus., 9 illus. in color.
Artikel-Nr.56171095

Inhalt/Kritik

Inhaltsverzeichnis
Applications and Protocols.- Post Quantum Secure ZRTP.- A New Hash-based Enhanced Privacy ID Signature Scheme.- Code Based Cryptography.- The Blockwise Rank Syndrome Learning problem and its applications to cryptography.- Reducing Signature Size of Matrix code based Signature Schemes.- Group-Action-Based Cryptography.- CCA Secure Updatable Encryption from Non Mappable Group Actions.- Properties of Lattice Isomorphism as a Cryptographic Group Action.- A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem.- On digital signatures based on group actions QROM security and ring signatures.- Lattice-Based Cryptography.- Phoenix Hash and Sign with Aborts from Lattice Gagdets.- Efficient Identity Based Encryption with Tight Adaptive Anonymity from RLWE.- An Improved Practical Key Mismatch Attack Against NTRU.- Improved Provable Reduction of NTRU and Hypercubic Lattices.- Compact Encryption based on Module NTRU problems.- Analyzing Pump and jump BKZ algorithm using dynamical systems.mehr

Schlagworte