Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014,

This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37

  • PDF / 6,060,098 Bytes
  • 292 Pages / 439.37 x 666.142 pts Page_size
  • 40 Downloads / 191 Views

DOWNLOAD

REPORT


Michele Mosca (Ed.)

Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014 Waterloo, ON, Canada, October 1–3, 2014 Proceedings

123

Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

8772

Michele Mosca (Ed.)

Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014 Waterloo, ON, Canada, October 1-3, 2014 Proceedings

13

Volume Editor Michele Mosca University of Waterloo Institute for Quantum Computing 200 University Avenue West Waterloo, ON N2L 3G1, Canada E-mail: [email protected]

ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-319-11658-7 e-ISBN 978-3-319-11659-4 DOI 10.1007/978-3-319-11659-4 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2014948669 LNCS Sublibrary: SL 4 – Security and Cryptology © Springer International Publishing Switzerland 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in ist current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and ther