libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > TESTI GENERALI

niederhagen ruben (curatore); saarinen markku-juhani o. (curatore) - post-quantum cryptography
Zoom

Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part I

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
71,98 €
NICEPRICE
68,38 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 03/2025





Trama

The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025, held in Taipei, Taiwan, during April 8–10, 2025.

The 25 full papers presented in the proceedings were carefully selected and reviewed from 59 submissions. The papers have been organized in the following topical sections:

Part I: Code-Based Cryptography; Multivariate Cryptography; Lattice-Based Cryptography.

Part II: Isogeny-Based Cryptography; Cryptanalysis; Quantum Security; Side-Channel Attacks; Security Notions.





Sommario

.- Code-Based Cryptography. 

.- On the Structure of the Schur Squares of Twisted Generalized Reed-Solomon Codes and Application to Cryptanalysis.

.- Quadratic Modelings of Syndrome Decoding.

.- An Improved Algorithm for Code Equivalence.

.- An Improved Both-May Information Set Decoding Algorithm: Towards More Efficient Time-Memory Trade-Offs.

.- Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements.

.- Multivariate Cryptography. 

.- Share the MAYO: Thresholdizing MAYO.

.- SoK: On the Physical Security of UOV-based Signature Schemes.

.- Shifting our Knowledge of MQ-Sign Security.

.- Lattice-Based Cryptography. 

.- Module Learning With Errors With Truncated Matrices.

.- Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More.

.- Giant Does NOT Mean Strong: Cryptanalysis of BQTRU.

.- Batch Anonymous MAC Tokens from Lattices.











Altre Informazioni

ISBN:

9783031865985

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XIV, 386 p. 44 illus., 15 illus. in color.
Pagine Arabe: 386
Pagine Romane: xiv


Dicono di noi