Atjaunināt sīkdatņu piekrišanu

Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 810, 2025, Proceedings, Part I [Mīkstie vāki]

  • Formāts: Paperback / softback, 386 pages, height x width: 235x155 mm, 15 Illustrations, color; 29 Illustrations, black and white; XIV, 386 p. 44 illus., 15 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15577
  • Izdošanas datums: 25-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031865987
  • ISBN-13: 9783031865985
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 61,19 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 71,99 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 386 pages, height x width: 235x155 mm, 15 Illustrations, color; 29 Illustrations, black and white; XIV, 386 p. 44 illus., 15 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15577
  • Izdošanas datums: 25-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031865987
  • ISBN-13: 9783031865985
Citas grāmatas par šo tēmu:
The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025, held in Taipei, Taiwan, during April 810, 2025.



The 25 full papers presented in the proceedings were carefully selected and reviewed from 59 submissions. The papers have been organized in the following topical sections:



Part I: Code-Based Cryptography; Multivariate Cryptography; Lattice-Based Cryptography.



Part II: Isogeny-Based Cryptography; Cryptanalysis; Quantum Security; Side-Channel Attacks; Security Notions.
.- Code-Based Cryptography. 


.- On the Structure of the Schur Squares of Twisted Generalized Reed-Solomon
Codes and Application to Cryptanalysis.


.- Quadratic Modelings of Syndrome Decoding.


.- An Improved Algorithm for Code Equivalence.


.- An Improved Both-May Information Set Decoding Algorithm: Towards More
Efficient Time-Memory Trade-Offs.


.- Enhancing Threshold Group Action Signature Schemes: Adaptive Security and
Scalability Improvements.


.- Multivariate Cryptography. 


.- Share the MAYO: Thresholdizing MAYO.


.- SoK: On the Physical Security of UOV-based Signature Schemes.


.- Shifting our Knowledge of MQ-Sign Security.


.- Lattice-Based Cryptography. 


.- Module Learning With Errors With Truncated Matrices.


.- Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and
More.


.- Giant Does NOT Mean Strong: Cryptanalysis of BQTRU.


.- Batch Anonymous MAC Tokens from Lattices.