Post-Quantum Cryptography - Niederhagen, Ruben; Saarinen, Markku-Juhani O.; (ed.) - Prospero Internet Bookshop

 
Product details:

ISBN13:9783031865985
ISBN10:3031865987
Binding:Paperback
No. of pages:386 pages
Size:235x155 mm
Language:English
Illustrations: 29 Illustrations, black & white; 15 Illustrations, color
700
Category:

Post-Quantum Cryptography

16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8?10, 2025, Proceedings, Part I
 
Publisher: Springer
Date of Publication:
Number of Volumes: 1 pieces, Book
 
Normal price:

Publisher's listprice:
EUR 70.61
Estimated price in HUF:
29 952 HUF (28 526 HUF + 5% VAT)
Why estimated?
 
Your price:

27 556 (26 244 HUF + 5% VAT )
discount is: 8% (approx 2 396 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Long description:

The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025, held in Taipei, Taiwan, during April 8–10, 2025.


The 25 full papers presented in the proceedings were carefully selected and reviewed from 59 submissions. The papers have been organized in the following topical sections:


Part I: Code-Based Cryptography; Multivariate Cryptography; Lattice-Based Cryptography.


Part II: Isogeny-Based Cryptography; Cryptanalysis; Quantum Security; Side-Channel Attacks; Security Notions.

Table of Contents:

.- Code-Based Cryptography. 


.- On the Structure of the Schur Squares of Twisted Generalized Reed-Solomon Codes and Application to Cryptanalysis.


.- Quadratic Modelings of Syndrome Decoding.


.- An Improved Algorithm for Code Equivalence.


.- An Improved Both-May Information Set Decoding Algorithm: Towards More Efficient Time-Memory Trade-Offs.


.- Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements.


.- Multivariate Cryptography. 


.- Share the MAYO: Thresholdizing MAYO.


.- SoK: On the Physical Security of UOV-based Signature Schemes.


.- Shifting our Knowledge of MQ-Sign Security.


.- Lattice-Based Cryptography. 


.- Module Learning With Errors With Truncated Matrices.


.- Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More.


.- Giant Does NOT Mean Strong: Cryptanalysis of BQTRU.


.- Batch Anonymous MAC Tokens from Lattices.