
Parametry
Více o knize
InhaltsverzeichnisCryptanalysis of Multivariate Systems.Properties of the Discrete Differential with Cryptographic Applications.Growth of the Ideal Generated by a Quadratic Boolean Function.Mutant Zhuang-Zi Algorithm.Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.Cryptanalysis of Code-Based Systems.Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes.Grover vs. McEliece.Information-Set Decoding for Linear Codes over F q.A Timing Attack against the Secret Permutation in the McEliece PKC.Practical Power Analysis Attacks on Software Implementations of McEliece.Design of Encryption Schemes.Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.Designing a Rank Metric Based McEliece Cryptosystem.Secure Variants of the Square Encryption Scheme.Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers.Design of Signature Schemes.Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles.Proposal of a Signature Scheme Based on STS Trapdoor.Selecting Parameters for the Rainbow Signature Scheme.
Nákup knihy
Post-quantum cryptography, Nicolas Sendrier
- Jazyk
- Rok vydání
- 2010
- product-detail.submit-box.info.binding
- (měkká)
Doručení
Platební metody
Navrhnout úpravu
- Titul
- Post-quantum cryptography
- Jazyk
- anglicky
- Autoři
- Nicolas Sendrier
- Vydavatel
- Springer
- Rok vydání
- 2010
- Vazba
- měkká
- ISBN10
- 3642129285
- ISBN13
- 9783642129285
- Kategorie
- Počítače, IT, programování
- Anotace
- InhaltsverzeichnisCryptanalysis of Multivariate Systems.Properties of the Discrete Differential with Cryptographic Applications.Growth of the Ideal Generated by a Quadratic Boolean Function.Mutant Zhuang-Zi Algorithm.Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.Cryptanalysis of Code-Based Systems.Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes.Grover vs. McEliece.Information-Set Decoding for Linear Codes over F q.A Timing Attack against the Secret Permutation in the McEliece PKC.Practical Power Analysis Attacks on Software Implementations of McEliece.Design of Encryption Schemes.Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.Designing a Rank Metric Based McEliece Cryptosystem.Secure Variants of the Square Encryption Scheme.Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers.Design of Signature Schemes.Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles.Proposal of a Signature Scheme Based on STS Trapdoor.Selecting Parameters for the Rainbow Signature Scheme.