TY - BOOK AU - Saarinen,Markku-Juhani AU - Smith-Tone,Daniel ED - SpringerLink (Online service) TI - Post-Quantum Cryptography: 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part I T2 - Lecture Notes in Computer Science, SN - 9783031627439 AV - QA268 U1 - 005.824 23 PY - 2024/// CY - Cham PB - Springer Nature Switzerland, Imprint: Springer KW - Cryptography KW - Data encryption (Computer science) KW - Application software KW - Computer networks  KW - Cryptology KW - Computer and Information Systems Applications KW - Computer Communication Networks N1 - Applications and Protocols -- Post Quantum Secure ZRTP -- A New Hash-based Enhanced Privacy ID Signature Scheme -- Code Based Cryptography -- The Blockwise Rank Syndrome Learning problem and its applications to cryptography -- Reducing Signature Size of Matrix code based Signature Schemes -- Group-Action-Based Cryptography -- CCA Secure Updatable Encryption from Non Mappable Group Actions -- Properties of Lattice Isomorphism as a Cryptographic Group Action -- A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem -- On digital signatures based on group actions QROM security and ring signatures -- Lattice-Based Cryptography -- Phoenix Hash and Sign with Aborts from Lattice Gagdets -- Efficient Identity Based Encryption with Tight Adaptive Anonymity from RLWE -- An Improved Practical Key Mismatch Attack Against NTRU -- Improved Provable Reduction of NTRU and Hypercubic Lattices -- Compact Encryption based on Module NTRU problems -- Analyzing Pump and jump BKZ algorithm using dynamical systems N2 - The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs. UR - http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-62743-9 ER -