|
|
|
|
LEADER |
06183cam a22013812 4500 |
001 |
0-1652499776 |
003 |
DE-627 |
005 |
20240122104930.0 |
007 |
cr uuu---uuuuu |
008 |
130705s2013 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642386169
|9 978-3-642-38616-9
|
024 |
7 |
|
|a 10.1007/978-3-642-38616-9
|2 doi
|
035 |
|
|
|a (DE-627)1652499776
|
035 |
|
|
|a (DE-576)386843635
|
035 |
|
|
|a (DE-599)BSZ386843635
|
035 |
|
|
|a (OCoLC)855543959
|
035 |
|
|
|a (ZBM)1263.94004
|
035 |
|
|
|a (ZBM)1263.94004
|
035 |
|
|
|a (DE-He213)978-3-642-38616-9
|
035 |
|
|
|a (EBP)040548619
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 81P94
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.62
|2 bkl
|
100 |
1 |
|
|a Gaborit, Philippe
|0 (DE-588)141092467
|0 (DE-627)703879138
|0 (DE-576)322149428
|4 aut
|
245 |
1 |
0 |
|a Post-Quantum Cryptography
|b 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings
|c edited by Philippe Gaborit
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2013
|
300 |
|
|
|a Online-Ressource (X, 259 p. 17 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7932
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Quantum computers.
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Algorithms.
|
655 |
|
7 |
|a Konferenzschrift
|y 2013
|z Limoges
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)7630202-7
|0 (DE-627)583310060
|0 (DE-576)287109178
|a Post-Quantum-Kryptografie
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4209132-9
|0 (DE-627)105106836
|0 (DE-576)210190086
|a Kryptosystem
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
776 |
1 |
|
|z 9783642386152
|
776 |
0 |
8 |
|i Druckausg.
|t Post-quantum cryptography
|d Berlin : Springer, 2013
|h X, 258 S.
|w (DE-627)745787452
|w (DE-576)399078630
|z 3642386156
|z 9783642386152
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7932
|9 7932
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-38616-9
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38616-9
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz386843635cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20140212094410
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1263.94004
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)751293083
|
912 |
|
|
|a ZDB-2-LNC
|b 2013
|
912 |
|
|
|a ZDB-2-SCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|b 2013
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
951 |
|
|
|a BO
|
950 |
|
|
|a Kryptographisches System
|
950 |
|
|
|a Verschlüsselungssystem
|
950 |
|
|
|a Chiffriersystem
|
950 |
|
|
|a Chiffrierung
|
950 |
|
|
|a Geheimschlüssel
|
950 |
|
|
|a Paarungsbasierte Kryptografie
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
950 |
|
|
|a Post-Quantum-Kryptographie
|
950 |
|
|
|a Post-Quantenkryptographie
|
950 |
|
|
|a Post-Quantenkryptologie
|
950 |
|
|
|a Post-Quantum cryptography
|
950 |
|
|
|a Post-Quantum Kryptografie
|
950 |
|
|
|a Post-Quanten-Kryptografie
|
950 |
|
|
|a PQK
|
950 |
|
|
|a Quantenkryptologie
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38616-9
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3360485424
|z 2013-07-05T09:11:19Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38616-9
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3360485459
|z 2013-07-05T09:11:19Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38616-9
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3360485491
|z 2013-07-05T09:11:19Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38616-9
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3360485521
|z 2013-07-05T09:11:19Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38616-9
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3360485556
|z 2013-07-05T09:11:19Z
|
980 |
|
|
|a 1652499776
|b 0
|k 1652499776
|o 386843635
|
SOLR
_version_ |
1792258612332068864 |
access_facet |
Electronic Resources |
author |
Gaborit, Philippe |
author_facet |
Gaborit, Philippe |
author_role |
aut |
author_sort |
Gaborit, Philippe |
author_variant |
p g pg |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations |
ctrlnum |
(DE-627)1652499776, (DE-576)386843635, (DE-599)BSZ386843635, (OCoLC)855543959, (ZBM)1263.94004, (DE-He213)978-3-642-38616-9, (EBP)040548619 |
de15_date |
2013-07-05T09:11:19Z |
dech1_date |
2013-07-05T09:11:19Z |
doi_str_mv |
10.1007/978-3-642-38616-9 |
era_facet |
2013 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Post-Quantum-Kryptografie, Kryptosystem, Kryptoanalyse |
finc_class_facet |
Informatik, Allgemeines, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2013 Limoges (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Limoges |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7932 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1652499776 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2013 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2013 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1652499776 |
is_hierarchy_title |
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings |
isbn |
9783642386169 |
isbn_isn_mv |
9783642386152, 3642386156 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1652499776 |
language |
English |
last_indexed |
2024-02-29T18:23:25.127Z |
local_heading_facet_dezwi2 |
Computer science, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Quantum computers., Electronic data processing, Algorithms., Post-Quantum-Kryptografie, Kryptosystem, Kryptoanalyse |
marc024a_ct_mv |
10.1007/978-3-642-38616-9 |
match_str |
gaborit2013postquantumcryptography5thinternationalworkshoppqcrypto2013limogesfrancejune472013proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7932 |
names_id_str_mv |
(DE-588)141092467, (DE-627)703879138, (DE-576)322149428 |
oclc_num |
855543959 |
physical |
Online-Ressource (X, 259 p. 17 illus, digital) |
publishDate |
2013 |
publishDateSort |
2013 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
386843635 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3231522 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7932 |
series2 |
Lecture Notes in Computer Science ; 7932, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Gaborit, Philippe (DE-588)141092467 (DE-627)703879138 (DE-576)322149428 aut, Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings edited by Philippe Gaborit, Berlin, Heidelberg Springer 2013, Online-Ressource (X, 259 p. 17 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7932, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations, Computer science, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Quantum computers., Electronic data processing, Algorithms., Konferenzschrift 2013 Limoges (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7630202-7 (DE-627)583310060 (DE-576)287109178 Post-Quantum-Kryptografie gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, DE-101, 9783642386152, Druckausg. Post-quantum cryptography Berlin : Springer, 2013 X, 258 S. (DE-627)745787452 (DE-576)399078630 3642386156 9783642386152, Lecture notes in computer science 7932 7932 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-38616-9 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-38616-9 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz386843635cov.jpg V:DE-576 X:springer image/jpeg 20140212094410 Cover, https://zbmath.org/?q=an:1263.94004 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)751293083, http://dx.doi.org/10.1007/978-3-642-38616-9 DE-14, DE-14 epn:3360485424 2013-07-05T09:11:19Z, http://dx.doi.org/10.1007/978-3-642-38616-9 DE-15, DE-15 epn:3360485459 2013-07-05T09:11:19Z, http://dx.doi.org/10.1007/978-3-642-38616-9 DE-Ch1, DE-Ch1 epn:3360485491 2013-07-05T09:11:19Z, http://dx.doi.org/10.1007/978-3-642-38616-9 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3360485521 2013-07-05T09:11:19Z, http://dx.doi.org/10.1007/978-3-642-38616-9 DE-520, DE-520 epn:3360485556 2013-07-05T09:11:19Z |
spellingShingle |
Gaborit, Philippe, Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings, Lecture notes in computer science, 7932, This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations, Computer science, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Quantum computers., Electronic data processing, Algorithms., Konferenzschrift 2013 Limoges, Konferenzschrift, Post-Quantum-Kryptografie, Kryptosystem, Kryptoanalyse |
swb_id_str |
386843635 |
title |
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings |
title_auth |
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings |
title_full |
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings edited by Philippe Gaborit |
title_fullStr |
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings edited by Philippe Gaborit |
title_full_unstemmed |
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings edited by Philippe Gaborit |
title_in_hierarchy |
7932. Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings (2013) |
title_short |
Post-Quantum Cryptography |
title_sort |
post quantum cryptography 5th international workshop pqcrypto 2013 limoges france june 4 7 2013 proceedings |
title_sub |
5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings |
title_unstemmed |
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings |
topic |
Computer science, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Quantum computers., Electronic data processing, Algorithms., Konferenzschrift 2013 Limoges, Konferenzschrift, Post-Quantum-Kryptografie, Kryptosystem, Kryptoanalyse |
topic_facet |
Computer science, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Quantum computers., Electronic data processing, Algorithms., Konferenzschrift, Post-Quantum-Kryptografie, Kryptosystem, Kryptoanalyse |
url |
https://doi.org/10.1007/978-3-642-38616-9, http://dx.doi.org/10.1007/978-3-642-38616-9, https://swbplus.bsz-bw.de/bsz386843635cov.jpg, https://zbmath.org/?q=an:1263.94004 |