Atjaunināt sīkdatņu piekrišanu

Post-Quantum Cryptography: 15th International Workshop, PQCrypto 2024, Oxford, UK, June 1214, 2024, Proceedings, Part I 2024 ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 434 pages, height x width: 235x155 mm, 9 Illustrations, color; 59 Illustrations, black and white; XII, 434 p. 68 illus., 9 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14771
  • Izdošanas datums: 11-Jun-2024
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031627423
  • ISBN-13: 9783031627422
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 73,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 86,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 434 pages, height x width: 235x155 mm, 9 Illustrations, color; 59 Illustrations, black and white; XII, 434 p. 68 illus., 9 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14771
  • Izdošanas datums: 11-Jun-2024
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031627423
  • ISBN-13: 9783031627422
Citas grāmatas par šo tēmu:
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 1214, 2024.





The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows:





Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; 





Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs.









 
Applications and Protocols.- Post Quantum Secure ZRTP.- A New Hash-based
Enhanced Privacy ID Signature Scheme.- Code Based Cryptography.- The
Blockwise Rank Syndrome Learning problem and its applications to
cryptography.- Reducing Signature Size of Matrix code based Signature
Schemes.- Group-Action-Based Cryptography.- CCA Secure Updatable Encryption
from Non Mappable Group Actions.- Properties of Lattice Isomorphism as a
Cryptographic Group Action.- A Subexponential Quantum Algorithm for the
Semidirect Discrete Logarithm Problem.- On digital signatures based on group
actions QROM security and ring signatures.- Lattice-Based
Cryptography.- Phoenix Hash and Sign with Aborts from Lattice Gagdets.-
Efficient Identity Based Encryption with Tight Adaptive Anonymity from RLWE.-
An Improved Practical Key Mismatch Attack Against NTRU.- Improved Provable
Reduction of NTRU and Hypercubic Lattices.- Compact Encryption based on
Module NTRU problems.- Analyzing Pump and jump BKZ algorithm using dynamical
systems.