You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations.
One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators of self-dual codes and their connections with invariant theory, which has inspired hundreds of papers about generalizations and applications of this theorem to different types of codes. This self-contained book develops a new theory which is powerful enough to include all the earlier generalizations.
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. Topi...
This book constitutes the refereed proceedings of the Third International Workshop on Post-Quantum Cryptography, PQCrypto 2010, held in Darmstadt, Germany, in May 2010. The 16 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on cryptanalysis of multivariate systems, cryptanalysis of code-based systems, design of encryption schemes, and design of signature schemes.
This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008. The 21 revised full papers presented, together with the abstract of one invited talk, were carefully reviewed and selected from 51 submissions. The papers deal with the various issues related to the use of small electronic tokens in the process of human-machine interactions. The conference scopes include numerous subfields such as networking, efficient implementations, physical security, biometrics, etc.
This book constitutes the refereed proceedings of the 30th Annual International Cryptology Conference, CRYPTO 2010, held in Santa Barbara, CA, USA in August 2010, co-located with CHES 2010, the workshop on Cryptographic Hardware and Embedded Systems. The 39 revised full papers presented were carefully reviewed and selected from 203 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on leakage, lattice, homomorphic encryption, theory and applications, key exchange, OAEP/RSA, CCA, attacks, composition, computation delegation and obfuscation, multiparty computation, pseudorandomness, and quantum.
This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011. The 18 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems that have the potential to resist possible future quantum computers, classical and quantum attacks, and security models for the post-quantum era..