Post-Quantum Cryptography
Cryptanalysis of Multivariate Systems.- Properties of the Discrete Differential with Cryptographic Applications.- Growth of the Ideal Generated by a Quadratic Boolean Function.- Mutant Zhuang-Zi Algorithm.- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.- Cryptanalysis of Code-Based Systems.- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes.- Grover vs. McEliece.- Information-Set Decoding for Linear Codes over F q .- A Timing Attack against the Secret Permutation in the McEliece PKC.- Practical Power Analysis Attacks on Software Implementations of McEliece.- Design of Encryption Schemes.- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.- Designing a Rank Metric Based McEliece Cryptosystem.- Secure Variants of the Square Encryption Scheme.- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers.- Design of Signature Schemes.- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles.- Proposal of a Signature Scheme Based on STS Trapdoor.- Selecting Parameters for the Rainbow Signature Scheme.
| Erscheint lt. Verlag | 21.5.2010 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 241 p. 27 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • aes • Algorithm analysis and problem complexity • authentication • code-based cryptography • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Digital Signatures • discrete differential • Finite Fields • Grover • identity based • key exc • Key exchange • linear codes • McEliece • multivariate cryptography • niederreiter • post quantum cryptography • power analysis attachs • provable security • Public Key Cryptography • quadratic boolean functions • Quantum Cryptography • rainbow signature • rational polynomials • RSA Cryptosystems • security analysis • side channel attacks • signature schemes • square encryption • Stream Ciphers • STS trapdoor • Symmetric Key Cryptosystems • unforgeable signatures |
| ISBN-13 | 9783642129285 / 9783642129285 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich