Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11505)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: PQCrypto 2019.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- authentication
- ciphertexts
- computer crime
- computer science
- cryptanalysis of post-quantum systems
- cryptography
- electronic document identification systems
- encryption
- hash-based cryptography
- isogeny-based cryptography
- lattice-based cryptography
- multivariate cryptography
- public key cryptography
- quantum computers
- quantum cryptanalysis
- secret-key cryptography
- security models for the post-quantum era
- side-channel attacks on post-quantum cryptography
Table of contents (22 papers)
-
Lattice-Based Cryptography
-
Key Establishment
Other volumes
-
Post-Quantum Cryptography
Editors and Affiliations
Bibliographic Information
Book Title: Post-Quantum Cryptography
Book Subtitle: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers
Editors: Jintai Ding, Rainer Steinwandt
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-25510-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2019
Softcover ISBN: 978-3-030-25509-1Published: 14 July 2019
eBook ISBN: 978-3-030-25510-7Published: 13 July 2019
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 418
Number of Illustrations: 563 b/w illustrations, 18 illustrations in colour
Topics: Cryptology, Security, Computing Milieux, Computer Systems Organization and Communication Networks