Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1344
Title: Post-Quantum Cryptography
Other Titles: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings /
Authors: Lange, Tanja. ;;Takagi, Tsuyoshi. ;
subject: Computer Science;Software Engineering;Computer Security;Data encryption (Computer science). ;;Coding theory. ;;Computer Science;Data Encryption. ;;Systems and Data Security;Software Engineering;Coding and Information Theory. ;
Year: 2017
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ;
Abstract: This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models. ;
Description: SpringerLink (Online service) ;
QA76.9.A25 ;
Printed edition: ; 9783319598789. ;




URI: http://localhost/handle/Hannan/1344
ISBN: 9783319598796 ;
9783319598789 (print) ;
More Information: XII, 427 p. 34 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319598796.pdf9.77 MBAdobe PDFThumbnail
Preview File
Title: Post-Quantum Cryptography
Other Titles: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings /
Authors: Lange, Tanja. ;;Takagi, Tsuyoshi. ;
subject: Computer Science;Software Engineering;Computer Security;Data encryption (Computer science). ;;Coding theory. ;;Computer Science;Data Encryption. ;;Systems and Data Security;Software Engineering;Coding and Information Theory. ;
Year: 2017
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ;
Abstract: This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models. ;
Description: SpringerLink (Online service) ;
QA76.9.A25 ;
Printed edition: ; 9783319598789. ;




URI: http://localhost/handle/Hannan/1344
ISBN: 9783319598796 ;
9783319598789 (print) ;
More Information: XII, 427 p. 34 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319598796.pdf9.77 MBAdobe PDFThumbnail
Preview File
Title: Post-Quantum Cryptography
Other Titles: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings /
Authors: Lange, Tanja. ;;Takagi, Tsuyoshi. ;
subject: Computer Science;Software Engineering;Computer Security;Data encryption (Computer science). ;;Coding theory. ;;Computer Science;Data Encryption. ;;Systems and Data Security;Software Engineering;Coding and Information Theory. ;
Year: 2017
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ;
Abstract: This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models. ;
Description: SpringerLink (Online service) ;
QA76.9.A25 ;
Printed edition: ; 9783319598789. ;




URI: http://localhost/handle/Hannan/1344
ISBN: 9783319598796 ;
9783319598789 (print) ;
More Information: XII, 427 p. 34 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319598796.pdf9.77 MBAdobe PDFThumbnail
Preview File