Willkommen, schön sind Sie da!
Logo Ex Libris

Post-Quantum Cryptography

  • Kartonierter Einband
  • 241 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s a... Weiterlesen
100.00 CHF 80.00
Sie sparen CHF 20.00
Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
Bestellung & Lieferung in eine Filiale möglich


The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor, Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer ,SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential:code-based,hash-based,lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de?ne the state of the art. In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008,washeldattheUniversityofCincinnati,USA, inOctober2008.


This book constitutes the refereed proceedings of the Third International Workshop on Post-Quantum Cryptography, PQCrypto 2010, held in Darmstadt, Germany, in May 2010. The 16 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on cryptanalysis of multivariate systems, cryptanalysis of code-based systems, design of encryption schemes, and design of signature schemes.

Cryptanalysis of Multivariate Systems.- Properties of the Discrete Differential with Cryptographic Applications.- Growth of the Ideal Generated by a Quadratic Boolean Function.- Mutant Zhuang-Zi Algorithm.- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.- Cryptanalysis of Code-Based Systems.- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes.- Grover vs. McEliece.- Information-Set Decoding for Linear Codes over F q .- A Timing Attack against the Secret Permutation in the McEliece PKC.- Practical Power Analysis Attacks on Software Implementations of McEliece.- Design of Encryption Schemes.- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.- Designing a Rank Metric Based McEliece Cryptosystem.- Secure Variants of the Square Encryption Scheme.- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers.- Design of Signature Schemes.- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles.- Proposal of a Signature Scheme Based on STS Trapdoor.- Selecting Parameters for the Rainbow Signature Scheme.


Titel: Post-Quantum Cryptography
Untertitel: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings
EAN: 9783642129285
ISBN: 978-3-642-12928-5
Format: Kartonierter Einband
Herausgeber: Springer, Berlin
Genre: Informatik
Anzahl Seiten: 241
Gewicht: 394g
Größe: H235mm x B162mm x T22mm
Jahr: 2010
Untertitel: Englisch
Auflage: 2010. 2010

Weitere Produkte aus der Reihe "Security and Cryptology"