Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008.

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.

Author(s): Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit (auth.), Johannes Buchmann, Jintai Ding (eds.)
Series: Lecture Notes in Computer Science 5299 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 231
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Information Systems Applications (incl.Internet)

Front Matter....Pages -
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory....Pages 1-16
Square-Vinegar Signature Scheme....Pages 17-30
Attacking and Defending the McEliece Cryptosystem....Pages 31-46
McEliece Cryptosystem Implementation: Theory and Practice....Pages 47-62
Merkle Tree Traversal Revisited....Pages 63-78
Explicit Hard Instances of the Shortest Vector Problem....Pages 79-94
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives....Pages 95-108
Digital Signatures Out of Second-Preimage Resistant Hash Functions....Pages 109-123
Cryptanalysis of Rational Multivariate Public Key Cryptosystems....Pages 124-136
Syndrome Based Collision Resistant Hashing....Pages 137-147
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems....Pages 148-164
On the Power of Quantum Encryption Keys....Pages 165-180
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ ....Pages 181-202
MXL2 : Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy....Pages 203-215
Side Channels in the McEliece PKC....Pages 216-229
Back Matter....Pages -