Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1344
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lange, Tanja. ; | en_US |
dc.contributor.author | Takagi, Tsuyoshi. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:52Z | - |
dc.date.available | 2020-05-17T08:27:52Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319598796 ; | en_US |
dc.identifier.isbn | 9783319598789 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1344 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319598789. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models. ; | en_US |
dc.description.statementofresponsibility | edited by Tanja Lange, Tsuyoshi Takagi. | en_US |
dc.format.extent | XII, 427 p. 34 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ; | en_US |
dc.relation.haspart | 9783319598796.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.title | Post-Quantum Cryptography | en_US |
dc.title.alternative | 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.82 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319598796.pdf | 9.77 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lange, Tanja. ; | en_US |
dc.contributor.author | Takagi, Tsuyoshi. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:52Z | - |
dc.date.available | 2020-05-17T08:27:52Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319598796 ; | en_US |
dc.identifier.isbn | 9783319598789 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1344 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319598789. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models. ; | en_US |
dc.description.statementofresponsibility | edited by Tanja Lange, Tsuyoshi Takagi. | en_US |
dc.format.extent | XII, 427 p. 34 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ; | en_US |
dc.relation.haspart | 9783319598796.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.title | Post-Quantum Cryptography | en_US |
dc.title.alternative | 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.82 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319598796.pdf | 9.77 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lange, Tanja. ; | en_US |
dc.contributor.author | Takagi, Tsuyoshi. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:52Z | - |
dc.date.available | 2020-05-17T08:27:52Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319598796 ; | en_US |
dc.identifier.isbn | 9783319598789 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1344 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319598789. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models. ; | en_US |
dc.description.statementofresponsibility | edited by Tanja Lange, Tsuyoshi Takagi. | en_US |
dc.format.extent | XII, 427 p. 34 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10346. ; | en_US |
dc.relation.haspart | 9783319598796.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.title | Post-Quantum Cryptography | en_US |
dc.title.alternative | 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.82 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319598796.pdf | 9.77 MB | Adobe PDF | Preview File |