Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25--28, 2010. Proceedings
From MaRDI portal
Publication:976291
DOI10.1007/978-3-642-12929-2zbMath1189.94010OpenAlexW316732839WikidataQ21769848 ScholiaQ21769848MaRDI QIDQ976291
No author found.
Publication date: 17 June 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-12929-2
Proceedings of conferences of miscellaneous specific interest (00B25) Cryptography (94A60) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ Wild McEliece ⋮ Wild McEliece Incognito
This page was built for publication: Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25--28, 2010. Proceedings