Code-Based Cryptography 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers /

Code-Based Cryptography 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers / [electronic resource] : edited by Jean-Christophe Deneuville. - 1st ed. 2023. - IX, 155 p. 19 illus., 7 illus. in color. online resource. - Lecture Notes in Computer Science, 13839 1611-3349 ; . - Lecture Notes in Computer Science, 13839 .

Distinguishing and Recovering Generalized Linearized ReedSolomon Codes -- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation -- Key-Recovery Fault Injection Attack on the Classic McEliece KEM -- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC -- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes -- On Decoding High-Order Interleaved Sum-Rank-Metric Codes -- Information Set Decoding for Lee-Metric Codes using Restricted Balls -- Cryptanalysis of IvanovKroukZyablov cryptosystem .

This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway. The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.

9783031296895

10.1007/978-3-031-29689-5 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Coding theory.
Information theory.
Data protection.
Computer networks--Security measures.
Cryptology.
Computer Communication Networks.
Coding and Information Theory.
Data and Information Security.
Mobile and Network Security.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in