%PDF-1.4 % 5 0 obj << /S /GoTo /D (chapter.1) >> endobj 8 0 obj (Introduction) endobj 9 0 obj << /S /GoTo /D (chapter.2) >> endobj 12 0 obj (Sequential composition of quantum zero-knowledge proof systems) endobj 13 0 obj << /S /GoTo /D (section.2.1) >> endobj 16 0 obj (Mathematical background) endobj 17 0 obj << /S /GoTo /D (section.2.2) >> endobj 20 0 obj (Interactive proof systems and the quantum zero-knowledge property) endobj 21 0 obj << /S /GoTo /D (subsection.2.2.1) >> endobj 24 0 obj (Quantum circuits and algorithms) endobj 25 0 obj << /S /GoTo /D (subsection.2.2.2) >> endobj 28 0 obj (Interactive proof systems) endobj 29 0 obj << /S /GoTo /D (subsection.2.2.3) >> endobj 32 0 obj (Polynomial quantum indistinguishability) endobj 33 0 obj << /S /GoTo /D (subsection.2.2.4) >> endobj 36 0 obj (The quantum zero-knowledge property) endobj 37 0 obj << /S /GoTo /D (subsection.2.2.5) >> endobj 40 0 obj (Sequential composition) endobj 41 0 obj << /S /GoTo /D (section.2.3) >> endobj 44 0 obj (Robustness of the quantum zero-knowledge property under sequential composition) endobj 45 0 obj << /S /GoTo /D (subsection.2.3.1) >> endobj 48 0 obj (Quantum statistical zero-knowledge) endobj 49 0 obj << /S /GoTo /D (subsection.2.3.2) >> endobj 52 0 obj (Quantum perfect zero-knowledge) endobj 53 0 obj << /S /GoTo /D (subsection.2.3.3) >> endobj 56 0 obj (Quantum computational zero-knowledge) endobj 57 0 obj << /S /GoTo /D (chapter.3) >> endobj 60 0 obj (CMSS -- an efficient variant of the Merkle signature scheme) endobj 61 0 obj << /S /GoTo /D (section.3.1) >> endobj 64 0 obj (Mathematical background) endobj 65 0 obj << /S /GoTo /D (subsection.3.1.1) >> endobj 68 0 obj (The Winternitz one-time signature scheme) endobj 69 0 obj << /S /GoTo /D (subsection.3.1.2) >> endobj 72 0 obj (The Merkle signature scheme) endobj 73 0 obj << /S /GoTo /D (section.3.2) >> endobj 76 0 obj (CMSS) endobj 77 0 obj << /S /GoTo /D (subsection.3.2.1) >> endobj 80 0 obj (Key pair generation) endobj 81 0 obj << /S /GoTo /D (subsection.3.2.2) >> endobj 84 0 obj (Signature generation) endobj 85 0 obj << /S /GoTo /D (subsection.3.2.3) >> endobj 88 0 obj (Signature verification) endobj 89 0 obj << /S /GoTo /D (section.3.3) >> endobj 92 0 obj (Specification and implementation) endobj 93 0 obj << /S /GoTo /D (subsection.3.3.1) >> endobj 96 0 obj (Scheme parameters) endobj 97 0 obj << /S /GoTo /D (subsection.3.3.2) >> endobj 100 0 obj (Signature generation and verification) endobj 101 0 obj << /S /GoTo /D (subsection.3.3.3) >> endobj 104 0 obj (Encoding) endobj 105 0 obj << /S /GoTo /D (section.3.4) >> endobj 108 0 obj (Timings and comparison) endobj 109 0 obj << /S /GoTo /D (chapter.4) >> endobj 112 0 obj (Efficiency improvements for NTRU) endobj 113 0 obj << /S /GoTo /D (section.4.1) >> endobj 116 0 obj (Mathematical background) endobj 117 0 obj << /S /GoTo /D (subsection.4.1.1) >> endobj 120 0 obj (The NTRU encryption scheme) endobj 121 0 obj << /S /GoTo /D (subsection.4.1.2) >> endobj 124 0 obj (NAEP/SVES-3) endobj 125 0 obj << /S /GoTo /D (section.4.2) >> endobj 128 0 obj (Pattern multiplication) endobj 129 0 obj << /S /GoTo /D (subsection.4.2.1) >> endobj 132 0 obj (Basic idea) endobj 133 0 obj << /S /GoTo /D (subsection.4.2.2) >> endobj 136 0 obj (The proposed algorithm) endobj 137 0 obj << /S /GoTo /D (subsection.4.2.3) >> endobj 140 0 obj (Timings and comparison) endobj 141 0 obj << /S /GoTo /D (section.4.3) >> endobj 144 0 obj (Specification and implementation) endobj 145 0 obj << /S /GoTo /D (subsection.4.3.1) >> endobj 148 0 obj (Instantiation) endobj 149 0 obj << /S /GoTo /D (subsection.4.3.2) >> endobj 152 0 obj (Parameters) endobj 153 0 obj << /S /GoTo /D (subsection.4.3.3) >> endobj 156 0 obj (Keys) endobj 157 0 obj << /S /GoTo /D (subsection.4.3.4) >> endobj 160 0 obj (Decryption) endobj 161 0 obj << /S /GoTo /D (subsection.4.3.5) >> endobj 164 0 obj (Efficient multiplication) endobj 165 0 obj << /S /GoTo /D (subsection.4.3.6) >> endobj 168 0 obj (Encoding) endobj 169 0 obj << /S /GoTo /D (section.4.4) >> endobj 172 0 obj (Timings and comparison) endobj 173 0 obj << /S /GoTo /D (chapter.5) >> endobj 176 0 obj (Efficient implementation of the McEliece Kobara-Imai PKCS) endobj 177 0 obj << /S /GoTo /D (section.5.1) >> endobj 180 0 obj (Mathematical background) endobj 181 0 obj << /S /GoTo /D (subsection.5.1.1) >> endobj 184 0 obj (Error correcting codes) endobj 185 0 obj << /S /GoTo /D (subsection.5.1.2) >> endobj 188 0 obj (Goppa codes) endobj 189 0 obj << /S /GoTo /D (subsection.5.1.3) >> endobj 192 0 obj (Efficient decoding of Goppa codes) endobj 193 0 obj << /S /GoTo /D (section.5.2) >> endobj 196 0 obj (The McEliece PKCS and its variants) endobj 197 0 obj << /S /GoTo /D (subsection.5.2.1) >> endobj 200 0 obj (The original McEliece PKCS) endobj 201 0 obj << /S /GoTo /D (subsection.5.2.2) >> endobj 204 0 obj (The McEliece Kobara-Imai PKCS) endobj 205 0 obj << /S /GoTo /D (subsection.5.2.3) >> endobj 208 0 obj (Speeding up the decoding algorithm) endobj 209 0 obj << /S /GoTo /D (section.5.3) >> endobj 212 0 obj (Specification and implementation) endobj 213 0 obj << /S /GoTo /D (subsection.5.3.1) >> endobj 216 0 obj (Parameters) endobj 217 0 obj << /S /GoTo /D (subsection.5.3.2) >> endobj 220 0 obj (Finite fields, vectors, and matrices) endobj 221 0 obj << /S /GoTo /D (subsection.5.3.3) >> endobj 224 0 obj (Key pairs) endobj 225 0 obj << /S /GoTo /D (subsection.5.3.4) >> endobj 228 0 obj (Encoding) endobj 229 0 obj << /S /GoTo /D (section.5.4) >> endobj 232 0 obj (Timings and comparison) endobj 233 0 obj << /S /GoTo /D (chapter.6) >> endobj 236 0 obj (A flexible API for cryptographic services) endobj 237 0 obj << /S /GoTo /D (section.6.1) >> endobj 240 0 obj (Design and drawbacks of the JCA) endobj 241 0 obj << /S /GoTo /D (subsection.6.1.1) >> endobj 244 0 obj (Engine concept) endobj 245 0 obj << /S /GoTo /D (subsection.6.1.2) >> endobj 248 0 obj (Algorithm registration and instantiation) endobj 249 0 obj << /S /GoTo /D (section.6.2) >> endobj 252 0 obj (Specification of the FlexiAPI) endobj 253 0 obj << /S /GoTo /D (subsection.6.2.1) >> endobj 256 0 obj (Overview) endobj 257 0 obj << /S /GoTo /D (subsection.6.2.2) >> endobj 260 0 obj (Ciphers) endobj 261 0 obj << /S /GoTo /D (subsection.6.2.3) >> endobj 264 0 obj (Algorithm registration and instantiation) endobj 265 0 obj << /S /GoTo /D (subsection.6.2.4) >> endobj 268 0 obj (Parameter specification and registration) endobj 269 0 obj << /S /GoTo /D (subsection.6.2.5) >> endobj 272 0 obj (JCA compatibility) endobj 273 0 obj << /S /GoTo /D (section.6.3) >> endobj 276 0 obj (Comparison and evaluation) endobj 277 0 obj << /S /GoTo /D (section.6.4) >> endobj 280 0 obj (Applications) endobj 281 0 obj << /S /GoTo /D (subsection.6.4.1) >> endobj 284 0 obj (Timings of cryptographic algorithms on a mobile phone) endobj 285 0 obj << /S /GoTo /D (subsection.6.4.2) >> endobj 288 0 obj (JCrypTool) endobj 289 0 obj << /S /GoTo /D (chapter.7) >> endobj 292 0 obj (Conclusion and outlook) endobj 293 0 obj << /S /GoTo /D (section*.62) >> endobj 296 0 obj (Bibliography) endobj 297 0 obj << /S /GoTo /D [298 0 R /Fit ] >> endobj 300 0 obj << /Length 671 /Filter /FlateDecode >> stream xuTn0+|Zj9ف^:=3hחZt"2H'?Ũi(mA8CQ)YtGV5IFכ=%[M2>;:LgwW#&ڢ8}h[yoDZbms.O AG%leQK {h9 Bey^ǯ83;j[ܨR XPUJҤp;Peol0ܧƃHPTc7PN"%Bkh r8!)b8{S !B0OAsvo!_;(HPvLbR3nS~vz?,+,CU͙~7HL
QaV%[^pBl6DuY
(bəbb|L}1vҊ4FߦdHZ&>$kk2Uh.*,
gBӻ)uazw;P'/?Uo
endstream
endobj
298 0 obj <<
/Type /Page
/Contents 300 0 R
/Resources 299 0 R
/MediaBox [0 0 595.276 841.89]
/Parent 307 0 R
>> endobj
301 0 obj <<
/D [298 0 R /XYZ 103.4 770.89 null]
>> endobj
302 0 obj <<
/D [298 0 R /XYZ 104.4 733.028 null]
>> endobj
299 0 obj <<
/Font << /F19 303 0 R /F20 304 0 R /F42 305 0 R /F44 306 0 R >>
/ProcSet [ /PDF /Text ]
>> endobj
310 0 obj <<
/Length 19
/Filter /FlateDecode
>>
stream
x3PHW0Pp2A c(
endstream
endobj
309 0 obj <<
/Type /Page
/Contents 310 0 R
/Resources 308 0 R
/MediaBox [0 0 595.276 841.89]
/Parent 307 0 R
>> endobj
311 0 obj <<
/D [309 0 R /XYZ 117.8 770.89 null]
>> endobj
308 0 obj <<
/ProcSet [ /PDF ]
>> endobj
315 0 obj <<
/Length 689
/Filter /FlateDecode
>>
stream
xڍTMs0W(`U_#LI22
6ril١ i CO^i'KلwTK"*&Eɬ&kI%"ס}gӕuHY^HE3˩t4]>%_D94΅aҎC&`Tr"E!( )܁)4d[q.0+MHTX ZÜ"YuH\