Atjaunināt sīkdatņu piekrišanu

Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 810, 2019 Revised Selected Papers 2019 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 418 pages, height x width: 235x155 mm, weight: 658 g, 18 Illustrations, color; 563 Illustrations, black and white; XIII, 418 p. 581 illus., 18 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 11505
  • Izdošanas datums: 14-Jul-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030255093
  • ISBN-13: 9783030255091
  • Mīkstie vāki
  • Cena: 68,33 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 80,39 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 418 pages, height x width: 235x155 mm, weight: 658 g, 18 Illustrations, color; 563 Illustrations, black and white; XIII, 418 p. 581 illus., 18 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 11505
  • Izdošanas datums: 14-Jul-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030255093
  • ISBN-13: 9783030255091
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Lattice-based Cryptography, Learning with Errors, Cryptanalysis, Key Establishment, Isogeny-based Cryptography, Hash-based cryptography, Code-based Cryptography.
Finding closest lattice vectors using approximate Voronoi cells.-
Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key
Encapsulation Mechanisms Using Software/Hardware Codesign.- Forward-Secure
Group Signatures from Lattices.- Towards Practical Microcontroller
Implementation of the Signature Scheme Falcon.- Round5: Compact and Fast
Post-Quantum Public-Key Encryption.- The impact of error dependencies on
Ring/Mod-LWE/LWR based schemes.- Direct CCA-Secure KEM and Deterministic PKE
from Plain LWE.- Recovering short secret keys of RLCE in polynomial time.-
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15.- On
the Complexity of Superdetermined Minrank Instances.- Constant-Round Group
Key Exchange from the Ring-RLWE Assumption.- Hybrid Key Encapsulation
Mechanisms and Authenticated Key Exchange.- Tighter security proofs for
generic key encapsulation mechanism in the quantum random oracle model.-
 (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random
Oracle Model.- Faster SeaSign signatures through improved rejection
sampling.- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two
Isogeny Cryptography.- On Lions and Elligators: An efficient constant-time
implementation of CSIDH.- Quantum security of hash functions and
property-preservation of iterated hashing.- Improved Quantum
Multicollision-Finding Algorithm.- Preventing timing attacks against RQC
using constant time decoding of Gabidulin codes.- A traceable ring signature
scheme based on coding theory.- On the Decoding Failure Rate of QC-MDPC
Bit-Flipping Decoders.