Atjaunināt sīkdatņu piekrišanu

Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 810, 2025, Proceedings, Part II [Mīkstie vāki]

  • Formāts: Paperback / softback, 386 pages, height x width: 235x155 mm, 32 Illustrations, color; 32 Illustrations, black and white; XIV, 386 p. 64 illus., 32 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15578
  • Izdošanas datums: 25-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031866010
  • ISBN-13: 9783031866012
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 61,19 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 71,99 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 386 pages, height x width: 235x155 mm, 32 Illustrations, color; 32 Illustrations, black and white; XIV, 386 p. 64 illus., 32 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15578
  • Izdošanas datums: 25-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031866010
  • ISBN-13: 9783031866012
Citas grāmatas par šo tēmu:
The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025, held in Taipei, Taiwan, during April 810, 2025.



The 25 full papers presented in the proceedings were carefully selected and reviewed from 59 submissions. The papers have been organized in the following topical sections:



Part I: Code-Based Cryptography; Multivariate Cryptography; Lattice-Based Cryptography.



Part II: Isogeny-Based Cryptography; Cryptanalysis; Quantum Security; Side-Channel Attacks; Security Notions.
.- Isogeny-Based Cryptography. 


.- Efficient Theta-Based Algorithms for Computing (, )-Isogenies on Kummer
Surfaces for Arbitrary Odd .


.- Commuting Ramanujan Graphs and the Random Self-Reducibility of Isogeny
Problems.


.- Cryptanalysis. 


.- Discrete Gaussian Sampling for BKZ-Reduced Basis.


.- An Efficient Collision Attack on Castryck-Decru-Smiths Hash Function.


.- Heuristic Algorithm for Solving Restricted SVP and its Applications.


.- Cryptanalysis of an Efficient Signature Based on Isotropic
Quadratic Forms.


.- Analysis of REDOG: the Pad Thai Attack.


.- Quantum Security. 


.- Quantum IND-CPA Security Notions for AEAD.


.- Reducing the Number of Qubits in Solving LWE.


.- Side-Channel Attacks. 


.- Single Trace Side-Channel Attack on the MPC-in-the-Head Framework.


.- Et tu, Brute? Side-Channel Assisted Chosen Ciphertext Attacks using Valid
Ciphertexts on HQC KEM.


.- Security Notions. 


.- Treating Dishonest Ciphertexts in Post-Quantum KEMs Explicit vs Implicit
Rejection in the FO Transform.


.- IND-CPAC: A New Security Notion for Conditional Decryption in Fully
Homomorphic Encryption.