Post-Quantum Cryptography
Springer International Publishing (Verlag)
978-3-030-25509-1 (ISBN)
Finding closest lattice vectors using approximate Voronoi cells.- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign.- Forward-Secure Group Signatures from Lattices.- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon.- Round5: Compact and Fast Post-Quantum Public-Key Encryption.- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes.- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE.- Recovering short secret keys of RLCE in polynomial time.- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15.- On the Complexity of Superdetermined Minrank Instances.- Constant-Round Group Key Exchange from the Ring-RLWE Assumption.- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model.- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.- Faster SeaSign signatures through improved rejection sampling.- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography.- On Lions and Elligators: An efficient constant-time implementation of CSIDH.- Quantum security of hash functions and property-preservation of iterated hashing.- Improved Quantum Multicollision-Finding Algorithm.- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes.- A traceable ring signature scheme based on coding theory.- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.
Erscheinungsdatum | 16.07.2019 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 418 p. 581 illus., 18 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 658 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • authentication • ciphertexts • computer crime • Computer Science • conference proceedings • cryptanalysis of post-quantum systems • cryptography • electronic document identification systems • Encryption • hash-based cryptography • Informatics • isogeny-based cryptography • Lattice-based cryptography • multivariate cryptography • Public Key Cryptography • Quantum Computers • quantum cryptanalysis • Research • secret-key cryptography • security models for the post-quantum era • side-channel attacks on post-quantum cryptography |
ISBN-10 | 3-030-25509-3 / 3030255093 |
ISBN-13 | 978-3-030-25509-1 / 9783030255091 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich