Limit this search to....

Post-Quantum Cryptography 2008 Edition
Contributor(s): Buchmann, Johannes (Editor), Ding, Jintai (Editor)
ISBN: 3540884025     ISBN-13: 9783540884026
Publisher: Springer
OUR PRICE:   $61.74  
Product Type: Paperback - Other Formats
Published: October 2008
Qty:
Annotation: This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008.

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.

Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Security - General
- Computers | Security - Networking
Dewey: 005.8
Series: Lecture Notes in Computer Science
Physical Information: 0.6" H x 6.1" W x 9.1" (0.80 lbs) 231 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.