Post-Quantum Cryptography

Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings

Nicolas Sendrier (Herausgeber)

Buch | Softcover
X, 241 Seiten
2010 | 2010
Springer Berlin (Verlag)
978-3-642-12928-5 (ISBN)
53,49 inkl. MwSt
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor, Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer ,SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential:code-based,hash-based,lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de?ne the state of the art. In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008,washeldattheUniversityofCincinnati,USA, inOctober2008.

Cryptanalysis of Multivariate Systems.- Properties of the Discrete Differential with Cryptographic Applications.- Growth of the Ideal Generated by a Quadratic Boolean Function.- Mutant Zhuang-Zi Algorithm.- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.- Cryptanalysis of Code-Based Systems.- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes.- Grover vs. McEliece.- Information-Set Decoding for Linear Codes over F q .- A Timing Attack against the Secret Permutation in the McEliece PKC.- Practical Power Analysis Attacks on Software Implementations of McEliece.- Design of Encryption Schemes.- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.- Designing a Rank Metric Based McEliece Cryptosystem.- Secure Variants of the Square Encryption Scheme.- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers.- Design of Signature Schemes.- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles.- Proposal of a Signature Scheme Based on STS Trapdoor.- Selecting Parameters for the Rainbow Signature Scheme.

Erscheint lt. Verlag 21.5.2010
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo X, 241 p. 27 illus.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • aes • Algorithm analysis and problem complexity • authentication • code-based cryptography • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Digital Signatures • discrete differential • Finite Fields • Grover • identity based • key exc • Key exchange • linear codes • McEliece • multivariate cryptography • niederreiter • post quantum cryptography • power analysis attachs • provable security • Public Key Cryptography • quadratic boolean functions • Quantum Cryptography • rainbow signature • rational polynomials • RSA Cryptosystems • security analysis • side channel attacks • signature schemes • square encryption • Stream Ciphers • STS trapdoor • Symmetric Key Cryptosystems • unforgeable signatures
ISBN-10 3-642-12928-5 / 3642129285
ISBN-13 978-3-642-12928-5 / 9783642129285
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich