Post-Quantum Cryptography

Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings
Buch | Softcover
X, 231 Seiten
2008 | 2008
Springer Berlin (Verlag)
978-3-540-88402-6 (ISBN)

Lese- und Medienproben

Post-Quantum Cryptography -
58,84 inkl. MwSt
This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.

Johannes A. Buchmann is Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and an Associate Editor of the Journal of Cryptology. In 1985, he received a Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. He has also received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft).

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.- Square-Vinegar Signature Scheme.- Attacking and Defending the McEliece Cryptosystem.- McEliece Cryptosystem Implementation: Theory and Practice.- Merkle Tree Traversal Revisited.- Explicit Hard Instances of the Shortest Vector Problem.- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives.- Digital Signatures Out of Second-Preimage Resistant Hash Functions.- Cryptanalysis of Rational Multivariate Public Key Cryptosystems.- Syndrome Based Collision Resistant Hashing.- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems.- On the Power of Quantum Encryption Keys.- Secure PRNGs from Specialized Polynomial Maps over Any .- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.- Side Channels in the McEliece PKC.

Erscheint lt. Verlag 6.10.2008
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo X, 231 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 385 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • aes • Algorithm analysis and problem complexity • authentication • code-based cryptography • coding theory • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Digital Signatures • Elliptic Curves • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • Hash Functions • HC/Informatik, EDV/Informatik • map decomposition • McEliece cryptosy • McEliece cryptosystem • Merkle signatures • multivariate cryptography • pairing computation • post quantum cryptography • provable security • Public Key Cryptography • Quantum Cryptography • rational polynomials • ring signatures • RSA Cryptosystems • security analysis • side channel attacks • signature schemes • Stream Ciphers • Symmetric Key Cryptosystems
ISBN-10 3-540-88402-5 / 3540884025
ISBN-13 978-3-540-88402-6 / 9783540884026
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich