skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings Preview this item
ClosePreview this item
Checking...

Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings

Author: Johannes Buchmann; Jintai Ding
Publisher: Berlin ; New York : Springer, ©2008.
Series: Lecture notes in computer science, 5299.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Print version:
PQCrypto 2008 (2008 : Cincinnati, Ohio).
Post-quantum cryptography.
Berlin ; New York : Springer, ©2008
(DLC) 2008936091
(OCoLC)262427779
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Johannes Buchmann; Jintai Ding
ISBN: 9783540884033 3540884033 9783540884026 3540884025 3540887016 9783540887010
OCLC Number: 304563387
Description: 1 online resource (x, 229 pages) : illustrations
Contents: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory --
Square-Vinegar Signature Scheme --
Attacking and Defending the McEliece Cryptosystem --
McEliece Cryptosystem Implementation: Theory and Practice --
Merkle Tree Traversal Revisited --
Explicit Hard Instances of the Shortest Vector Problem --
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and?IC-Derivatives --
Digital Signatures Out of Second-Preimage Resistant Hash Functions --
Cryptanalysis of Rational Multivariate Public Key Cryptosystems --
Syndrome Based Collision Resistant Hashing --
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems --
On the Power of Quantum Encryption Keys --
Secure PRNGs from Specialized Polynomial Maps over Any --
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy --
Side Channels in the McEliece PKC.
Series Title: Lecture notes in computer science, 5299.; LNCS sublibrary., SL 4,, Security and cryptology.
Responsibility: Johannes Buchmann, Jintai Ding (eds.).

Abstract:

The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/304563387<\/a>> # Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"304563387<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/gw<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Place\/berlin<\/a>> ; # Berlin<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/884552<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.82\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Topic\/informatique<\/a>> ; # Informatique<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/887935<\/a>> ; # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Topic\/cryptography<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/44610556<\/a>> ; # Jintai Ding<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/304199<\/a>> ; # Johannes Buchmann<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2008<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Meeting\/pqcrypto_conference_2nd_2008_cincinnati_ohio<\/a>> ; # PQCrypto (Conference) (2nd : 2008 : Cincinnati, Ohio)<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2008<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"A New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/3769181705<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Conference publication<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Conference papers and proceedings<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Series\/lecture_notes_in_computer_science<\/a>> ; # Lecture notes in computer science ;<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Series\/lncs_sublibrary<\/a>> ; # LNCS sublibrary.<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/worldcat.org\/issn\/0302-9743<\/a>> ; # Lecture notes in computer science,<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Series\/lncs_sublibrary_sl_4_security_and_cryptology<\/a>> ; # LNCS sublibrary: SL 4--Security and cryptology<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/262427779<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"304563387<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/304563387#PublicationEvent\/berlin_new_york_springer_2008<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=3063628<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/0-link-springer-com.pugwash.lib.warwick.ac.uk\/10.1007\/978-3-540-88403-3<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/link.springer.com\/book\/10.1007\/978-3-540-88403-3<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/link.springer.com\/10.1007\/978-3-540-88403-3<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/link.springer.com\/openurl?genre=book&isbn=978-3-540-88701-0<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-3-540-88403-3<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/ebookcentral.proquest.com\/lib\/qut\/detail.action?docID=428797<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/site.ebrary.com\/id\/10277695<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/site.ebrary.com\/id\/10257837<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1007\/978-3-540-88403-3<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783540887010<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783540884033<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783540884026<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/304563387<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> # New York<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"New York<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dewey.info\/class\/005.82\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dx.doi.org\/10.1007\/978-3-540-88403-3<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Agent\/springer<\/a>> # Springer<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Springer<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Meeting\/pqcrypto_conference_2nd_2008_cincinnati_ohio<\/a>> # PQCrypto (Conference) (2nd : 2008 : Cincinnati, Ohio)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Meeting<\/a>, schema:Event<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Place\/cincinnati_ohio<\/a>> ; # Cincinnati, Ohio)<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"PQCrypto (Conference) (2nd : 2008 : Cincinnati, Ohio)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Place\/berlin<\/a>> # Berlin<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Berlin<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Place\/cincinnati_ohio<\/a>> # Cincinnati, Ohio)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cincinnati, Ohio)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Series\/lecture_notes_in_computer_science<\/a>> # Lecture notes in computer science ;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/304563387<\/a>> ; # Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Lecture notes in computer science ;<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Series\/lncs_sublibrary<\/a>> # LNCS sublibrary.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/304563387<\/a>> ; # Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"LNCS sublibrary.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Series\/lncs_sublibrary_sl_4_security_and_cryptology<\/a>> # LNCS sublibrary: SL 4--Security and cryptology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/304563387<\/a>> ; # Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"LNCS sublibrary: SL 4--Security and cryptology<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Topic\/cryptography<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nrdfs:seeAlso<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2008101157<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Topic\/informatique<\/a>> # Informatique<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Informatique<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/gw<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"gw<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/884552<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/887935<\/a>> # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data encryption (Computer science)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/304199<\/a>> # Johannes Buchmann<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Buchmann<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Johannes<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Johannes Buchmann<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/44610556<\/a>> # Jintai Ding<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Ding<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jintai<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jintai Ding<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783540884026<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3540884025<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783540884026<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783540884033<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3540884033<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783540884033<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783540887010<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3540887016<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783540887010<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/issn\/0302-9743<\/a>> # Lecture notes in computer science,<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/304563387<\/a>> ; # Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\n\u00A0\u00A0\u00A0\nschema:issn<\/a> \"0302-9743<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Lecture notes in computer science,<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/262427779<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Post-quantum cryptography.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/304563387<\/a>> ; # Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/304563387<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/304563387<\/a>> ; # Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-02-03<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/304563387#PublicationEvent\/berlin_new_york_springer_2008<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Place\/berlin<\/a>> ; # Berlin<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3769181705#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n