Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption s
✦ LIBER ✦
Post-quantum cryptography: lattice signatures
✍ Scribed by Johannes Buchmann; Richard Lindner; Markus Rückert; Michael Schneider
- Book ID
- 106202762
- Publisher
- Springer Vienna
- Year
- 2009
- Tongue
- English
- Weight
- 372 KB
- Volume
- 85
- Category
- Article
- ISSN
- 0010-485X
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
Post-Quantum Cryptography || Introductio
✍
Bernstein, Daniel J.; Buchmann, Johannes; Dahmen, Erik
📂
Article
📅
2009
🏛
Springer Berlin Heidelberg
🌐
German
⚖ 853 KB
One-time proxy signature based on quantu
✍
Tian-Yin Wang; Zong-Li Wei
📂
Article
📅
2011
🏛
Springer US
🌐
English
⚖ 146 KB
A sessional blind signature based on qua
✍
Siavash Khodambashi, Ali Zakerolhosseini
📂
Article
📅
2013
🏛
Springer US
🌐
English
⚖ 190 KB
A weak blind signature scheme based on q
✍
Xiaojun Wen; Xiamu Niu; Liping Ji; Yuan Tian
📂
Article
📅
2009
🏛
Elsevier Science
🌐
English
⚖ 165 KB
Cryptanalysis of a sessional blind signa
✍
Qi Su,Wen-Min Li
📂
Article
📅
2014
🏛
Springer US
🌐
English
⚖ 208 KB
[Lecture Notes in Computer Science] Adva
✍
Kim, Tai-hoon; Adeli, Hojjat
📂
Article
📅
2010
🏛
Springer Berlin Heidelberg
🌐
English
⚖ 317 KB
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher