Cantitate/Preț
Produs

Post-Quantum Cryptography: 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I: Lecture Notes in Computer Science, cartea 14771

Editat de Markku-Juhani Saarinen, Daniel Smith-Tone
en Limba Engleză Paperback – 11 iun 2024
​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12–14, 2024.
The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows:
Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; 
Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs.

 
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 77706 lei  6-8 săpt.
  Springer Nature Switzerland – 11 iun 2024 77706 lei  6-8 săpt.
  Springer Nature Switzerland – 11 iun 2024 77706 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 77706 lei

Preț vechi: 94764 lei
-18% Nou

Puncte Express: 1166

Preț estimativ în valută:
14869 15524$ 12306£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031627422
ISBN-10: 3031627423
Ilustrații: XII, 434 p. 68 illus., 9 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Applications and Protocols.- Post Quantum Secure ZRTP.- A New Hash-based Enhanced Privacy ID Signature Scheme.- Code Based Cryptography.- The Blockwise Rank Syndrome Learning problem and its applications to cryptography.- Reducing Signature Size of Matrix code based Signature Schemes.- Group-Action-Based Cryptography.- CCA Secure Updatable Encryption from Non Mappable Group Actions.- Properties of Lattice Isomorphism as a Cryptographic Group Action.- A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem.- On digital signatures based on group actions QROM security and ring signatures.- Lattice-Based Cryptography.- Phoenix Hash and Sign with Aborts from Lattice Gagdets.- Efficient Identity Based Encryption with Tight Adaptive Anonymity from RLWE.- An Improved Practical Key Mismatch Attack Against NTRU.- Improved Provable Reduction of NTRU and Hypercubic Lattices.- Compact Encryption based on Module NTRU problems.- Analyzing Pump and jump BKZ algorithm using dynamical systems.