Normal view MARC view ISBD view

Post-Quantum Cryptography [electronic resource] : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / edited by Tanja Lange, Tsuyoshi Takagi.

Contributor(s): Lange, Tanja [editor.] | Takagi, Tsuyoshi [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10346Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: XII, 427 p. 34 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319598796.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Software engineering | Coding theory | Information theory | Cryptology | Data and Information Security | Software Engineering | Coding and Information TheoryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.

There are no comments for this item.

Log in to your account to post a comment.