Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Third International Workshop on Post-Quantum Cryptography, PQCrypto 2010, held in Darmstadt, Germany, in May 2010. The 16 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on cryptanalysis of multivariate systems, cryptanalysis of code-based systems, design of encryption schemes, and design of signature schemes.

Author(s): Daniel Smith-Tone (auth.), Nicolas Sendrier (eds.)
Series: Lecture Notes in Computer Science 6061 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 241
City: Berlin
Tags: Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Systems and Data Security; Operating Systems

Front Matter....Pages -
Properties of the Discrete Differential with Cryptographic Applications....Pages 1-12
Growth of the Ideal Generated by a Quadratic Boolean Function....Pages 13-27
Mutant Zhuang-Zi Algorithm....Pages 28-40
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme....Pages 41-60
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes....Pages 61-72
Grover vs. McEliece....Pages 73-80
Information-Set Decoding for Linear Codes over F q ....Pages 81-94
A Timing Attack against the Secret Permutation in the McEliece PKC....Pages 95-107
Practical Power Analysis Attacks on Software Implementations of McEliece....Pages 108-125
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials....Pages 126-141
Designing a Rank Metric Based McEliece Cryptosystem....Pages 142-152
Secure Variants of the Square Encryption Scheme....Pages 153-164
Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers....Pages 165-181
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles....Pages 182-200
Proposal of a Signature Scheme Based on STS Trapdoor....Pages 201-217
Selecting Parameters for the Rainbow Signature Scheme....Pages 218-240
Back Matter....Pages -