Post-Quantum Cryptography
Springer Berlin (Verlag)
978-3-540-88402-6 (ISBN)
Johannes A. Buchmann is Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and an Associate Editor of the Journal of Cryptology. In 1985, he received a Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. He has also received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft).
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.- Square-Vinegar Signature Scheme.- Attacking and Defending the McEliece Cryptosystem.- McEliece Cryptosystem Implementation: Theory and Practice.- Merkle Tree Traversal Revisited.- Explicit Hard Instances of the Shortest Vector Problem.- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives.- Digital Signatures Out of Second-Preimage Resistant Hash Functions.- Cryptanalysis of Rational Multivariate Public Key Cryptosystems.- Syndrome Based Collision Resistant Hashing.- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems.- On the Power of Quantum Encryption Keys.- Secure PRNGs from Specialized Polynomial Maps over Any .- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.- Side Channels in the McEliece PKC.
Erscheint lt. Verlag | 6.10.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 231 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 385 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • aes • Algorithm analysis and problem complexity • authentication • code-based cryptography • coding theory • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Digital Signatures • Elliptic Curves • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • Hash Functions • HC/Informatik, EDV/Informatik • map decomposition • McEliece cryptosy • McEliece cryptosystem • Merkle signatures • multivariate cryptography • pairing computation • post quantum cryptography • provable security • Public Key Cryptography • Quantum Cryptography • rational polynomials • ring signatures • RSA Cryptosystems • security analysis • side channel attacks • signature schemes • Stream Ciphers • Symmetric Key Cryptosystems |
ISBN-10 | 3-540-88402-5 / 3540884025 |
ISBN-13 | 978-3-540-88402-6 / 9783540884026 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich