Post-Quantum Cryptography

Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

  • Johannes Buchmann
  • Jintai Ding

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5299)

Table of contents

  1. Front Matter
  2. Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit
    Pages 1-16
  3. John Baena, Crystal Clough, Jintai Ding
    Pages 17-30
  4. Daniel J. Bernstein, Tanja Lange, Christiane Peters
    Pages 31-46
  5. Bhaskar Biswas, Nicolas Sendrier
    Pages 47-62
  6. Johannes Buchmann, Erik Dahmen, Michael Schneider
    Pages 63-78
  7. Johannes Buchmann, Richard Lindner, Markus Rückert
    Pages 79-94
  8. Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang
    Pages 95-108
  9. Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    Pages 109-123
  10. Matthieu Finiasz
    Pages 137-147
  11. Akinori Kawachi, Christopher Portmann
    Pages 165-180
  12. Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang
    Pages 181-202
  13. Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann
    Pages 203-215
  14. Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan
    Pages 216-229
  15. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008.

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.

Keywords

AES McEliece cryptosy access control authentication code-based cryptography coding theory cryptanalysis cryptographic protocols cryptography cryptology digital signatures elliptic curves hash function hash functions quantum cryptography

Editors and affiliations

  • Johannes Buchmann
    • 1
  • Jintai Ding
    • 2
  1. 1.Department of Computer ScienceTechnische Universität DarmstadtDarmstadtGermany
  2. 2.University of CincinnatiUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-88403-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-88402-6
  • Online ISBN 978-3-540-88403-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book