Post-Quantum Cryptography

Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings

  • Nicolas Sendrier

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6061)

Table of contents

  1. Front Matter
  2. Cryptanalysis of Multivariate Systems

    1. Jintai Ding, Timothy J. Hodges, Victoria Kruglov
      Pages 13-27
    2. Jintai Ding, Dieter S. Schmidt
      Pages 28-40
    3. Weiwei Cao, Xiuyun Nie, Lei Hu, Xiling Tang, Jintai Ding
      Pages 41-60
  3. Cryptanalysis of Code-Based Systems

  4. Design of Encryption Schemes

    1. Delphine Boucher, Philippe Gaborit, Willi Geiselmann, Olivier Ruatta, Felix Ulmer
      Pages 126-141
    2. Crystal Lee Clough, Jintai Ding
      Pages 153-164
  5. Design of Signature Schemes

    1. Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita
      Pages 201-217
    2. Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
      Pages 218-240
  6. Back Matter

About these proceedings

Keywords

AES Grover access control authentication code-based cryptography cryptanalysis cryptographic attacks cryptographic protocols cryptography cryptology cryptosystems digital signatures discrete differential finite fields identity based key exc

Editors and affiliations

  • Nicolas Sendrier
    • 1
  1. 1.Projet Team SECRETCentre de Recherche INRIA Paris-Rocquencourt,Le Chesnay CedexFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-12929-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-12928-5
  • Online ISBN 978-3-642-12929-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book