|
|
|
|
LEADER |
03032nam a2200565 4500 |
001 |
978-3-319-79063-3 |
003 |
DE-He213 |
005 |
20191028092103.0 |
007 |
cr nn 008mamaa |
008 |
180403s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319790633
|9 978-3-319-79063-3
|
024 |
7 |
|
|a 10.1007/978-3-319-79063-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Post-Quantum Cryptography
|h [electronic resource] :
|b 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings /
|c edited by Tanja Lange, Rainer Steinwandt.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XIII, 529 p. 59 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10786
|
505 |
0 |
|
|a Code-based Cryptography -- Cryptanalysis -- Hash-based Cryptography -- Isogenies in Cryptography -- Lattice-based Cryptography -- Multivariate Cryptography -- Protocols -- Quantum Algorithms.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Code-based Cryptography; Cryptanalysis; Hash-based Cryptography; Isogenies in Cryptography; Lattice-based Cryptography; Multivariate Cryptography; Protocols; Quantum Algorithms. .
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Logic design.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
650 |
2 |
4 |
|a Logic Design.
|0 http://scigraph.springernature.com/things/product-market-codes/I12050
|
700 |
1 |
|
|a Lange, Tanja.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Steinwandt, Rainer.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319790626
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319790640
|
830 |
|
0 |
|a Security and Cryptology ;
|v 10786
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-79063-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|