Code-Based Cryptography
10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers
Seiten
2023
|
1st ed. 2023
Springer International Publishing (Verlag)
978-3-031-29688-8 (ISBN)
Springer International Publishing (Verlag)
978-3-031-29688-8 (ISBN)
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.
The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.
The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.
Distinguishing and Recovering Generalized Linearized ReedSolomon Codes.- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation.- Key-Recovery Fault Injection Attack on the Classic McEliece KEM.- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC.- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes.- On Decoding High-Order Interleaved Sum-Rank-Metric Codes.- Information Set Decoding for Lee-Metric Codes using Restricted Balls.- Cryptanalysis of IvanovKroukZyablov cryptosystem
Erscheinungsdatum | 31.03.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | IX, 155 p. 19 illus., 7 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 266 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • authentication • block and stream cyphers • Communication Systems • Computer Science • Computer Security • conference proceedings • cryptography • Data Security • Digital Signatures • Error Correcting Codes • Informatics • lattices • mathematical foundations of cryptography • Network Security • Public Key Cryptography • public key techniques • Research • Signal Processing • symmetric cryptography |
ISBN-10 | 3-031-29688-5 / 3031296885 |
ISBN-13 | 978-3-031-29688-8 / 9783031296888 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €