Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Post-Quantum Cryptography -

Post-Quantum Cryptography

16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part II
Buch | Softcover
XIV, 386 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-86601-2 (ISBN)
CHF 98,85 inkl. MwSt

The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025, held in Taipei, Taiwan, during April 8 10, 2025.

The 25 full papers presented in the proceedings were carefully selected and reviewed from 59 submissions. The papers have been organized in the following topical sections:

Part I: Code-Based Cryptography; Multivariate Cryptography; Lattice-Based Cryptography.

Part II: Isogeny-Based Cryptography; Cryptanalysis; Quantum Security; Side-Channel Attacks; Security Notions.

.- Isogeny-Based Cryptography. 

.- Efficient Theta-Based Algorithms for Computing ( , )-Isogenies on Kummer Surfaces for Arbitrary Odd .

.- Commuting Ramanujan Graphs and the Random Self-Reducibility of Isogeny Problems.

.- Cryptanalysis. 

.- Discrete Gaussian Sampling for BKZ-Reduced Basis.

.- An Efficient Collision Attack on Castryck-Decru-Smith s Hash Function.

.- Heuristic Algorithm for Solving Restricted SVP and its Applications.

.- Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms.

.- Analysis of REDOG: the Pad Thai Attack.

.- Quantum Security. 

.- Quantum IND-CPA Security Notions for AEAD.

.- Reducing the Number of Qubits in Solving LWE.

.- Side-Channel Attacks. 

.- Single Trace Side-Channel Attack on the MPC-in-the-Head Framework.

.- Et tu, Brute? Side-Channel Assisted Chosen Ciphertext Attacks using Valid Ciphertexts on HQC KEM.

.- Security Notions. 

.- Treating Dishonest Ciphertexts in Post-Quantum KEMs Explicit vs Implicit Rejection in the FO Transform.

.- IND-CPAC: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIV, 386 p. 64 illus., 32 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte code-based cryptography • Cryptanalysis • isogeny-based cryptography • Lattice-based cryptography • multivariate cryptography • post-quantum cryptography • Quantum Security • Security Notions • side-channel attacks
ISBN-10 3-031-86601-0 / 3031866010
ISBN-13 978-3-031-86601-2 / 9783031866012
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich