Muutke küpsiste eelistusi

E-raamat: Post-Quantum Cryptography: 17th International Workshop, PQCrypto 2026, Saint-Malo, France, April 14-16, 2026, Proceedings, Part II

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.



The 27 full papers presented in the proceedings were carefully selected and reviewed from 66 submissions. These papers have been organized in the following topical sections:



Part I: Quantum Algorithms and Quantum Security; Code-Based Cryptography; Lattice-Based Cryptography; and PQC Signatures and Implementation Techniques.



Part II: Isogeny- and Group-Action-Based Cryptography; Cryptographic Protocols and PQC Transition; Code-Based Attacks; and Cryptanalysis and Fault Attacks.



 
.- Isogeny- and Group-Action-Based Cryptography.
.- Endomorphisms via Splittings.
.- On the Use of Atkin and Weber Modular Polynomials in Isogeny Proofs of
Knowledge.
.- On the Active Security of the PEARL-SCALLOP Group Action.
.- Cryptographic Protocols and PQC Transition.
.- A Practical Framework for Lattice-Based Non-Interactive Publicly
Verifiable Secret Sharing.
.- Compact, Efficient and Non-Separable Hybrid Signatures.
.- PETCHA: Post-Quantum Efficient Transciphering with ChaCha.
.- Code-Based Attacks.
.- Recursion Enabled: Improved Cryptanalysis of the Permuted Kernel Problem.
.- Breaking RHQCs Post-Compromise Security.
.- On Breaking McEliece Keys Using Brute Force.
.- Cryptanalysis and Fault Attacks.
.- Handling Noisy Plaintext Checking Oracles with SPiRiT.
.- Refined Modelling of the Primal Attack, and Variants Against Module-LWE.
.- A Collision Attack on the LTZ Hash Function Based on a Conjecture on
Supersingular Non-Superspecial Isogeny Graphs of Dimension
2.
.- Fault Attacks on MPCitH Signature Schemes.