libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > TESTI GENERALI

saarinen markku-juhani (curatore); smith-tone daniel (curatore) - post-quantum cryptography
Zoom

Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II

;




Disponibilità: Non disponibile o esaurito presso l'editore


PREZZO
180,98 €



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 06/2024





Trama

The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12–14, 2024.

The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows:

Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; 

Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs.





Sommario

Isogeny-Based Cryptography.- Adaptive attacks against FESTA without input validation or constant time implementation.- Updatable Encryption from Group Actions.- Fault Attack on SQIsign.- Multivariate Cryptography.- Cryptanalysis of the SNOVA Signature Scheme.- One vector to rule them all Key recovery from one vector in UOV schemes.- Polynomial XL A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings.- State of the art of HFE variants Is it possible to repair HFE with appropriate modifiers.- Practical key recovery attack on MQ Sign and more.- Practical and Theoretical Cryptanalysis of VOX.-Quantum Algorithms.- Extending Regevs Factoring Algorithm to Compute Discrete Logarithms.- Transforms and Proofs.- A note on Failing gracefully Completing the picture for explicitly rejecting Fujisaki Okamoto transforms using worst case correctness.- Two Round Threshold Lattice Based Signatures from Threshold Homomorphic Encryption.- Hash your Keys before Signing BUFF Security of the Additional NIST PQC Signatures.- Revisiting Anonymity in Post Quantum Public Key Encryption.











Altre Informazioni

ISBN:

9783031627453

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XII, 372 p. 69 illus., 11 illus. in color.
Pagine Arabe: 372
Pagine Romane: xii


Dicono di noi