Unlimited Access
For Registered Users
To contact us, you can contact us via the following mobile numbers by calling and WhatsApp
For Registered Users
100% Secure Payment
10 Days Returns
Call Us Anytime
Category: encryption edition: 1 Authors: Marco Baldi, Marco Bianchi, Franco Chiaraluce (auth.), Philippe Gaborit (eds.) serie: Lecture Notes in Computer Science 7932 Security and Cryptology ISBN : 9783642386152, 9783642386169 publisher: Springer-Verlag Berlin Heidelberg publish year: 2013 pages: 268 language: English ebook format : PDF (It will be converted to PDF, EPUB OR AZW3 if requested by the user) file size: 3 MB
Related keywords of Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings book : Data Encryption, Systems and Data Security, Quantum Computing, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity
Front Matter....Pages -
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures....Pages 1-15
Quantum Algorithms for the Subset-Sum Problem....Pages 16-33
Improved Lattice-Based Threshold Ring Signature Scheme....Pages 34-51
Degree of Regularity for HFEv and HFEv-....Pages 52-66
Software Speed Records for Lattice-Based Signatures....Pages 67-82
Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search....Pages 83-101
An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes....Pages 102-117
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations....Pages 118-135
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework....Pages 136-154
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme....Pages 155-164
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems....Pages 165-173
Secure and Anonymous Hybrid Encryption from Coding Theory....Pages 174-187
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes....Pages 188-202
The Hardness of Code Equivalence over $\mathbb{F}_q$ and Its Application to Code-Based Cryptography....Pages 203-216
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems....Pages 217-230
Simple Matrix Scheme for Encryption....Pages 231-242
Multivariate Signature Scheme Using Quadratic Forms....Pages 243-258
Back Matter....Pages -