Atjaunināt sīkdatņu piekrišanu

E-grāmata: Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings

  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 6061
  • Izdošanas datums: 01-Jun-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642129292
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 6061
  • Izdošanas datums: 01-Jun-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642129292
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor's algorithm (Peter W. Shor, "Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer",SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential:code-based,hash-based,lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de ne the state of the art. In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008,washeldattheUniversityofCincinnati,USA, inOctober2008.
Cryptanalysis of Multivariate Systems
Properties of the Discrete Differential with Cryptographic Applications
1(12)
Daniel Smith-Tone
Growth of the Ideal Generated by a Quadratic Boolean Function
13(15)
Jintai Ding
Timothy J. Hodges
Victoria Kruglov
Mutant Zhuang-Zi Algorithm
28(13)
Jintai Ding
Dieter S. Schmidt
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme
41(20)
Weiwei Cao
Xiuyun Nie
Lei Hu
Xiling Tang
Jintai Ding
Cryptanalysis of Code-Based Systems
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
61(12)
Christian Wieschebrink
Grover vs. McEliece
73(8)
Daniel J. Bernstein
Information-Set Decoding for Linear Codes over Fq
81(14)
Christiane Peters
A Timing Attack against the Secret Permutation in the McEliece PKC
95(13)
Falko Strenzke
Practical Power Analysis Attacks on Software Implementations of McEliece
108(18)
Stefan Heyse
Amir Moradi
Christof Paar
Design of Encryption Schemes
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
126(16)
Delphine Boucher
Philippe Gaborit
Willi Geiselmann
Olivier Ruatta
Felix Ulmer
Designing a Rank Metric Based McEliece Cryptosystem
142(11)
Pierre Loidreau
Secure Variants of the Square Encryption Scheme
153(12)
Crystal Lee Clough
Jintai Ding
Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers
165(17)
Stefan Heyse
Design of Signature Schemes
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
182(19)
Markus Ruckert
Proposal of a Signature Scheme Based on STS Trapdoor
201(17)
Shigeo Tsujii
Masahito Gotaishi
Kohtaro Tadaki
Ryo Fujita
Selecting Parameters for the Rainbow Signature Scheme
218(23)
Albrecht Petzoldt
Stanislav Bulygin
Johannes Buchmann
Author Index 241