Post-quantum cryptography : 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings / Jintai Ding, Jean-Pierre Tillich (eds.).
2020
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Post-quantum cryptography : 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings / Jintai Ding, Jean-Pierre Tillich (eds.).
Meeting Name
PQCrypto (Conference) (11th : 2020 : Paris, France)
ISBN
9783030442231 (electronic book)
3030442233 (electronic book)
9783030442224
3030442233 (electronic book)
9783030442224
Published
Cham : Springer, 2020.
Language
English
Description
1 online resource (xiii, 560 pages) : illustrations.
Item Number
10.1007/978-3-030-44223-1 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/24
Summary
This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed April 20, 2020).
Added Author
Ding, Jintai, editor.
Tillich, Jean-Pierre, editor.
Tillich, Jean-Pierre, editor.
Series
Lecture notes in computer science ; 12100.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783030442224
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Code-based cryptography
Implementation
Isogeny-based cryptography
Lattice-based cryptography
Multivariate cryptography
Quantum algorithms
Security proofs.
Implementation
Isogeny-based cryptography
Lattice-based cryptography
Multivariate cryptography
Quantum algorithms
Security proofs.