Post-quantum cryptography : 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings / Jintai Ding, Jean-Pierre Tillich (eds.).
2020
QA76.9.A25
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Post-quantum cryptography : 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings / Jintai Ding, Jean-Pierre Tillich (eds.).
Meeting Name
ISBN
9783030442231 (electronic book)
3030442233 (electronic book)
9783030442224
3030442233 (electronic book)
9783030442224
Published
Cham : Springer, 2020.
Language
English
Description
1 online resource (xiii, 560 pages) : illustrations.
Item Number
10.1007/978-3-030-44223-1 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/24
Summary
This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed April 20, 2020).
Added Author
Series
Lecture notes in computer science ; 12100.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783030442224
Linked Resources
Record Appears in
Table of Contents
Code-based cryptography
Implementation
Isogeny-based cryptography
Lattice-based cryptography
Multivariate cryptography
Quantum algorithms
Security proofs.
Implementation
Isogeny-based cryptography
Lattice-based cryptography
Multivariate cryptography
Quantum algorithms
Security proofs.