Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5299)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): PQCrypto: International Conference on Post-Quantum Cryptography
Conference proceedings info: PQCrypto 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (15 papers)
-
Front Matter
-
Back Matter
About this book
Keywords
- AES
- McEliece cryptosy
- access control
- authentication
- code-based cryptography
- coding theory
- cryptanalysis
- cryptographic protocols
- cryptography
- cryptology
- digital signatures
- elliptic curves
- hash function
- hash functions
- quantum cryptography
- algorithm analysis and problem complexity
Editors and Affiliations
-
Department of Computer Science, Technische Universität Darmstadt, Darmstadt, Germany
Johannes Buchmann
-
University of Cincinnati, USA
Jintai Ding
Bibliographic Information
Book Title: Post-Quantum Cryptography
Book Subtitle: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings
Editors: Johannes Buchmann, Jintai Ding
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-88403-3
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2008
Softcover ISBN: 978-3-540-88402-6Published: 06 October 2008
eBook ISBN: 978-3-540-88403-3Published: 09 October 2008
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 231
Topics: Cryptology, Data and Information Security, User Interfaces and Human Computer Interaction, IT Operations, Algorithms, Computer Communication Networks