| Título : |
12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Cheon, Jung Hee, ; Tillich, Jean-Pierre, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XIII, 500 p. 73 ilustraciones, 20 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-81293-5 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Criptología Seguridad de datos e información Redes de comunicación informática Ingeniería Informática y Redes Red informática Ingeniería Informática Criptografía Cifrado de datos (Informática) Protección de datos |
| Índice Dewey: |
5.824 |
| Resumen: |
Este volumen constituye las actas de la 12.ª Conferencia Internacional sobre criptografía poscuántica, PQCrypto 2021, celebrada en Daejeon, Corea del Sur, en julio de 2021. Los 25 artículos completos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 65 presentaciones. Cubren un amplio espectro de investigaciones dentro del alcance de la conferencia, incluida la criptografía basada en código, hash, isogenia y red, criptografía multivariada y criptoanálisis cuántico. |
| Nota de contenido: |
Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric -- Multivariate Cryptography -- Improving Thomae-Wolf Algorithm for Solving Underdetermined -- Multivariate Quadratic Polynomial Problem -- New Practical Multivariate Signatures from a Nonlinear Modifier -- On the Effect of Projection on Rank Attacks in Multivariate Cryptography -- Quantum Algorithms -- Quantum Key Search for Ternary LWE -- A fusion algorithm for solving the hidden shift problem in finite abelian groups -- The "quantum annoying" property of password-authenticated key exchange protocols -- Implementation and Side channel attack -- Differential Power Analysis of the Picnic Signature Scheme -- Implementation of Lattice Trapdoors on Modules and Applications -- Verifying Post-Quantum Signatures in 8 KiB of RAM -- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists -- Isogeny -- CSI-RAShi: Distributed key generation for CSIDH -- SimS: a Simplification of SiGamal -- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE -- Lattice-Based Cryptography -- Generating cryptographically-strong random lattice bases and recognizing rotations of Z -- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions -- Short Identity-Based Signatures with Tight Security from Lattices -- On Removing Rejection Conditions in Practical Lattice-Based Signatures -- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems -- Cryptanalysis -- Attack on Beyond-Birthday-Bound MACs in Quantum Setting -- An algebraic approach to the Rank Support Learning problem -- Quantum Indistinguishability for Public Key Encryption -- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings [documento electrónico] / Cheon, Jung Hee, ; Tillich, Jean-Pierre, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIII, 500 p. 73 ilustraciones, 20 ilustraciones en color. ISBN : 978-3-030-81293-5 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Criptología Seguridad de datos e información Redes de comunicación informática Ingeniería Informática y Redes Red informática Ingeniería Informática Criptografía Cifrado de datos (Informática) Protección de datos |
| Índice Dewey: |
5.824 |
| Resumen: |
Este volumen constituye las actas de la 12.ª Conferencia Internacional sobre criptografía poscuántica, PQCrypto 2021, celebrada en Daejeon, Corea del Sur, en julio de 2021. Los 25 artículos completos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 65 presentaciones. Cubren un amplio espectro de investigaciones dentro del alcance de la conferencia, incluida la criptografía basada en código, hash, isogenia y red, criptografía multivariada y criptoanálisis cuántico. |
| Nota de contenido: |
Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric -- Multivariate Cryptography -- Improving Thomae-Wolf Algorithm for Solving Underdetermined -- Multivariate Quadratic Polynomial Problem -- New Practical Multivariate Signatures from a Nonlinear Modifier -- On the Effect of Projection on Rank Attacks in Multivariate Cryptography -- Quantum Algorithms -- Quantum Key Search for Ternary LWE -- A fusion algorithm for solving the hidden shift problem in finite abelian groups -- The "quantum annoying" property of password-authenticated key exchange protocols -- Implementation and Side channel attack -- Differential Power Analysis of the Picnic Signature Scheme -- Implementation of Lattice Trapdoors on Modules and Applications -- Verifying Post-Quantum Signatures in 8 KiB of RAM -- Fast NEON-based multiplication for lattice-based NIST Post-Quantum Cryptography finalists -- Isogeny -- CSI-RAShi: Distributed key generation for CSIDH -- SimS: a Simplification of SiGamal -- Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE -- Lattice-Based Cryptography -- Generating cryptographically-strong random lattice bases and recognizing rotations of Z -- Zero-Knowledge Proofs for Committed Symmetric Boolean Functions -- Short Identity-Based Signatures with Tight Security from Lattices -- On Removing Rejection Conditions in Practical Lattice-Based Signatures -- Secure Hybrid Encryption In the Standard Model from Hard Learning Problems -- Cryptanalysis -- Attack on Beyond-Birthday-Bound MACs in Quantum Setting -- An algebraic approach to the Rank Support Learning problem -- Quantum Indistinguishability for Public Key Encryption -- A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |