<p>From the reviews:</p><p>“The book offers a detailed overview of the main intractable problems which ensure security of usual cryptosystems … and the way to solve them using quantum calculus. … It can be very well used as a course for undergraduate students, many notions being self-contained … . book is very interesting, easily to be followed, pedagogically constructed. It offers a good source of information, being an excellent support for students and researchers who wish to find general details about the new paradigm of computation … .” (Adrian Atanasiu, zbMATH, Vol. 1273, 2013)</p>

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Les mer

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use.

Les mer

Classic and Quantum Computation.- Quantum Attacks on IFP-Based Cryptosystems.- Quantum Attacks on DLP-Based Cryptosystems.- Quantum Attacks on ECDLP-Based Cryptosystems.- Quantum-Computing Resistant Cryptosystems.

Les mer
Discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystems Covers many alternative post-quantum cryptosystems to replace the classic IFP, DLP and ECDLP based cryptosystems Cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset Includes supplementary material: sn.pub/extras
Les mer
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Les mer

Produktdetaljer

ISBN
9781489997791
Publisert
2015-05-20
Utgiver
Vendor
Springer-Verlag New York Inc.
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet

Forfatter