|
Showing 1 - 4 of
4 matches in All Departments
This open access book presents selected papers from International
Symposium on Mathematics, Quantum Theory, and Cryptography (MQC),
which was held on September 25-27, 2019 in Fukuoka, Japan. The
international symposium MQC addresses the mathematics and quantum
theory underlying secure modeling of the post quantum cryptography
including e.g. mathematical study of the light-matter interaction
models as well as quantum computing. The security of the most
widely used RSA cryptosystem is based on the difficulty of
factoring large integers. However, in 1994 Shor proposed a quantum
polynomial time algorithm for factoring integers, and the RSA
cryptosystem is no longer secure in the quantum computing model.
This vulnerability has prompted research into post-quantum
cryptography using alternative mathematical problems that are
secure in the era of quantum computers. In this regard, the
National Institute of Standards and Technology (NIST) began to
standardize post-quantum cryptography in 2016. This book is
suitable for postgraduate students in mathematics and computer
science, as well as for experts in industry working on post-quantum
cryptography.
This open access book presents selected papers from International
Symposium on Mathematics, Quantum Theory, and Cryptography (MQC),
which was held on September 25-27, 2019 in Fukuoka, Japan. The
international symposium MQC addresses the mathematics and quantum
theory underlying secure modeling of the post quantum cryptography
including e.g. mathematical study of the light-matter interaction
models as well as quantum computing. The security of the most
widely used RSA cryptosystem is based on the difficulty of
factoring large integers. However, in 1994 Shor proposed a quantum
polynomial time algorithm for factoring integers, and the RSA
cryptosystem is no longer secure in the quantum computing model.
This vulnerability has prompted research into post-quantum
cryptography using alternative mathematical problems that are
secure in the era of quantum computers. In this regard, the
National Institute of Standards and Technology (NIST) began to
standardize post-quantum cryptography in 2016. This book is
suitable for postgraduate students in mathematics and computer
science, as well as for experts in industry working on post-quantum
cryptography.
This book presents the mathematical background underlying security
modeling in the context of next-generation cryptography. By
introducing new mathematical results in order to strengthen
information security, while simultaneously presenting fresh
insights and developing the respective areas of mathematics, it is
the first-ever book to focus on areas that have not yet been fully
exploited for cryptographic applications such as representation
theory and mathematical physics, among others. Recent advances in
cryptanalysis, brought about in particular by quantum computation
and physical attacks on cryptographic devices, such as side-channel
analysis or power analysis, have revealed the growing security
risks for state-of-the-art cryptographic schemes. To address these
risks, high-performance, next-generation cryptosystems must be
studied, which requires the further development of the mathematical
background of modern cryptography. More specifically, in order to
avoid the security risks posed by adversaries with advanced attack
capabilities, cryptosystems must be upgraded, which in turn relies
on a wide range of mathematical theories. This book is suitable for
use in an advanced graduate course in mathematical cryptography,
while also offering a valuable reference guide for experts.
This book presents the mathematical background underlying security
modeling in the context of next-generation cryptography. By
introducing new mathematical results in order to strengthen
information security, while simultaneously presenting fresh
insights and developing the respective areas of mathematics, it is
the first-ever book to focus on areas that have not yet been fully
exploited for cryptographic applications such as representation
theory and mathematical physics, among others. Recent advances in
cryptanalysis, brought about in particular by quantum computation
and physical attacks on cryptographic devices, such as side-channel
analysis or power analysis, have revealed the growing security
risks for state-of-the-art cryptographic schemes. To address these
risks, high-performance, next-generation cryptosystems must be
studied, which requires the further development of the mathematical
background of modern cryptography. More specifically, in order to
avoid the security risks posed by adversaries with advanced attack
capabilities, cryptosystems must be upgraded, which in turn relies
on a wide range of mathematical theories. This book is suitable for
use in an advanced graduate course in mathematical cryptography,
while also offering a valuable reference guide for experts.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|