MARC details
000 -LÍDER |
fixed length control field |
04575nam a22005415i 4500 |
001 - NÚMERO DE CONTROL |
control field |
u374376 |
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL |
control field |
SIRSI |
005 - FECHA Y HORA DE LA ULTIMA TRANSACCIÓN |
control field |
20160812084231.0 |
007 - CAMPO FIJO DE DESCRIPCIÓN FIJA--INFORMACIÓN GENERAL |
fixed length control field |
cr nn 008mamaa |
008 - ELEMENTOS DE LONGITUD FIJA -- INFORMACIÓN GENERAL |
fixed length control field |
100531s2010 gw | s |||| 0|eng d |
020 ## - NÚMERO INTERNACIONAL NORMALIZADO PARA LIBROS |
International Standard Book Number |
9783642129292 |
-- |
978-3-642-12929-2 |
040 ## - FUENTE DE CATALOGACIÓN |
Transcribing agency |
MX-MeUAM |
050 #4 - SIGNATURA TOPOGRÁFICA DE LA BIBLIOTECA DEL CONGRESO |
Classification number |
QA76.9.A25 |
082 04 - NÚMERO DE CLASIFICACIÓN DECIMAL DEWEY |
Classification number |
005.82 |
Edition number |
23 |
100 1# - ASIENTO PRINCIPAL--NOMBRE PERSONAL |
Personal name |
Sendrier, Nicolas. |
Relator term |
editor. |
245 10 - MENCIÓN DE TITULO |
Title |
Post-Quantum Cryptography |
Medium |
[recurso electrónico] : |
Remainder of title |
Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings / |
Statement of responsibility, etc. |
edited by Nicolas Sendrier. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer |
Springer Berlin Heidelberg, |
Date of production, publication, distribution, manufacture, or copyright notice |
2010. |
300 ## - DESCRIPCIÓN FÍSICA |
Extent |
X, 241p. 27 illus. |
Other physical details |
online resource. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
490 1# - MENCIÓN DE SERIE |
Series statement |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume/sequential designation |
6061 |
505 0# - NOTA DE CONTENIDO |
Formatted contents note |
Cryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic Applications -- Growth of the Ideal Generated by a Quadratic Boolean Function -- Mutant Zhuang-Zi Algorithm -- Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme -- Cryptanalysis of Code-Based Systems -- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes -- Grover vs. McEliece -- Information-Set Decoding for Linear Codes over F q -- A Timing Attack against the Secret Permutation in the McEliece PKC -- Practical Power Analysis Attacks on Software Implementations of McEliece -- Design of Encryption Schemes -- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials -- Designing a Rank Metric Based McEliece Cryptosystem -- Secure Variants of the Square Encryption Scheme -- Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers -- Design of Signature Schemes -- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles -- Proposal of a Signature Scheme Based on STS Trapdoor -- Selecting Parameters for the Rainbow Signature Scheme. |
520 ## - NOTA DE RESUMEN, ETC. |
Summary, etc. |
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor’s algorithm (Peter W. Shor, “Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer”,SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential:code-based,hash-based,lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de?ne the state of the art. In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008,washeldattheUniversityofCincinnati,USA, inOctober2008. |
596 ## - |
-- |
19 |
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Computer science. |
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Computer Communication Networks. |
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Operating systems (Computers). |
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Data protection. |
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Data encryption (Computer science). |
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Computer software. |
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Information Systems. |
650 14 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Computer Science. |
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Data Encryption. |
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Computer Communication Networks. |
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Management of Computing and Information Systems. |
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Algorithm Analysis and Problem Complexity. |
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Systems and Data Security. |
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO |
Topical term or geographic name as entry element |
Operating Systems. |
710 2# - ASIENTO SECUNDARIO - NOMBRE CORPORATIVO |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783642129285 |
830 #0 - ASIENTO SECUNDARIO DE SERIE--TITULO UNIFORME |
Uniform title |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume number/sequential designation |
6061 |
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS |
Public note |
Libro electrónico |
Uniform Resource Identifier |
<a href="http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-12929-2">http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-12929-2</a> |
942 ## - TIPO DE MATERIAL (KOHA) |
Koha item type |
Libro Electrónico |