TY - BOOK AU - Sendrier,Nicolas ED - SpringerLink (Online service) TI - Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings T2 - Lecture Notes in Computer Science, SN - 9783642129292 AV - QA76.9.A25 U1 - 005.82 23 PY - 2010/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg KW - Computer science KW - Computer Communication Networks KW - Operating systems (Computers) KW - Data protection KW - Data encryption (Computer science) KW - Computer software KW - Information Systems KW - Computer Science KW - Data Encryption KW - Management of Computing and Information Systems KW - Algorithm Analysis and Problem Complexity KW - Systems and Data Security KW - Operating Systems N1 - Cryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic Applications -- Growth of the Ideal Generated by a Quadratic Boolean Function -- Mutant Zhuang-Zi Algorithm -- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme -- Cryptanalysis of Code-Based Systems -- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes -- Grover vs. McEliece -- Information-Set Decoding for Linear Codes over F q -- A Timing Attack against the Secret Permutation in the McEliece PKC -- Practical Power Analysis Attacks on Software Implementations of McEliece -- Design of Encryption Schemes -- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials -- Designing a Rank Metric Based McEliece Cryptosystem -- Secure Variants of the Square Encryption Scheme -- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers -- Design of Signature Schemes -- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles -- Proposal of a Signature Scheme Based on STS Trapdoor -- Selecting Parameters for the Rainbow Signature Scheme UR - http://dx.doi.org/10.1007/978-3-642-12929-2 ER -