Book Details

Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

Publication year: 2008

: 978-3-540-88403-3

:


The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.


: Computer Science, AES, McEliece cryptosy, access control, authentication, code-based cryptography, coding theory, cryptanalysis, cryptographic protocols, cryptography, cryptology, digital signatures, elliptic curves, hash function, hash functions, quantum cryptography, algorithm analysis and problem complexity, Cryptology, Systems and Data Security, User Interfaces and Human Computer Interaction, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Computer Communication Networks