Post-quantum cryptography [electronic resource] : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings / Johannes Buchmann, Jintai Ding (eds.)

This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are pr...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: PQCrypto (Conference) Cincinnati, Ohio)
Other Authors: Buchmann, Johannes, Ding, Jintai
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2008.
Series:Lecture notes in computer science ; 5299.
LNCS sublibrary. Security and cryptology.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b8759866
006 m o d
007 cr |||||||||||
008 090213s2008 gw a ob 101 0 eng d
005 20240418142924.1
019 |a 646771943  |a 646798536  |a 698467595  |a 767202154 
020 |a 9783540884033  |q (pdf) 
020 |a 3540884033  |q (pdf) 
020 |a 9783540884026  |q (pbk.) 
020 |a 3540884025  |q (pbk.) 
020 |a 3540887016 
020 |a 9783540887010 
020 |z 9783540887010 
035 |a (OCoLC)spr304563387 
035 |a (OCoLC)304563387  |z (OCoLC)646771943  |z (OCoLC)646798536  |z (OCoLC)698467595  |z (OCoLC)767202154 
037 |a spr10.1007/978-3-540-88403-3 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d UMC  |d CEF  |d OCLCQ  |d E7B  |d OCLCO  |d OCLCA  |d OCLCQ  |d A7U  |d OCLCQ  |d OCLCF  |d BEDGE  |d OCLCQ  |d COO  |d OCLCO  |d YDXCP  |d NUI  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.A25  |b P63 2008eb 
111 2 |a PQCrypto (Conference)  |n (2nd :  |d 2008 :  |c Cincinnati, Ohio)  |0 http://id.loc.gov/authorities/names/nb2008023278. 
245 1 0 |a Post-quantum cryptography  |h [electronic resource] :  |b second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /  |c Johannes Buchmann, Jintai Ding (eds.) 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2008. 
300 |a 1 online resource (x, 229 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 5299. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
504 |a Includes bibliographical references and author index. 
505 0 |a A New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. 
520 |a This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems. 
588 0 |a Print version record. 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033. 
650 0 |a Cryptography  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101157. 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Buchmann, Johannes.  |0 http://id.loc.gov/authorities/names/n93008030  |1 http://isni.org/isni/0000000110347997. 
700 1 |a Ding, Jintai.  |0 http://id.loc.gov/authorities/names/no2007008897  |1 http://isni.org/isni/0000000049187313. 
776 0 8 |i Print version:  |a PQCrypto 2008 (2008 : Cincinnati, Ohio).  |t Post-quantum cryptography.  |d Berlin ; New York : Springer, ©2008  |z 9783540884026  |z 3540884025  |w (DLC) 2008936091  |w (OCoLC)262427779. 
830 0 |a Lecture notes in computer science ;  |v 5299.  |0 http://id.loc.gov/authorities/names/n42015162. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology.  |0 http://id.loc.gov/authorities/names/no2007042442. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-540-88403-3  |z Full Text (via Springer) 
907 |a .b87598668  |b 03-19-20  |c 08-16-16 
998 |a web  |b 05-01-17  |c g  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
907 |a .b87598668  |b 07-02-19  |c 08-16-16 
944 |a MARS - RDA ENRICHED 
907 |a .b87598668  |b 07-06-17  |c 08-16-16 
907 |a .b87598668  |b 05-23-17  |c 08-16-16 
915 |a I 
956 |a Springer e-books 
956 |b Springer Nature - Springer Computer Science eBooks 2008 English International 
999 f f |i e5fb0ef0-2dd5-507a-8009-47b426f3efb2  |s 1410f986-4af8-5d0f-adeb-f8a0c4f1cdc2 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 P63 2008eb  |h Library of Congress classification  |i Ebooks, Prospector  |n 1