Buch, Englisch, Band 14771, 434 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 674 g
15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part I
Buch, Englisch, Band 14771, 434 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 674 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-62742-2
Verlag: Springer Nature Switzerland
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12–14, 2024.
The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows:
Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography;
Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Applications and Protocols.- Post Quantum Secure ZRTP.- A New Hash-based Enhanced Privacy ID Signature Scheme.- Code Based Cryptography.- The Blockwise Rank Syndrome Learning problem and its applications to cryptography.- Reducing Signature Size of Matrix code based Signature Schemes.- Group-Action-Based Cryptography.- CCA Secure Updatable Encryption from Non Mappable Group Actions.- Properties of Lattice Isomorphism as a Cryptographic Group Action.- A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem.- On digital signatures based on group actions QROM security and ring signatures.- Lattice-Based Cryptography.- Phoenix Hash and Sign with Aborts from Lattice Gagdets.- Efficient Identity Based Encryption with Tight Adaptive Anonymity from RLWE.- An Improved Practical Key Mismatch Attack Against NTRU.- Improved Provable Reduction of NTRU and Hypercubic Lattices.- Compact Encryption based on Module NTRU problems.- Analyzing Pump and jump BKZ algorithm using dynamical systems.