書目名稱 | Post-Quantum Cryptography | 編輯 | Daniel J. Bernstein,Johannes Buchmann,Erik Dahmen | 視頻video | http://file.papertrans.cn/753/752051/752051.mp4 | 概述 | The contributors to the book take on the big challenge in cryptography, namely: what to do when someone will break the crypto-systems of today.Includes supplementary material: | 圖書封面 |  | 描述 | .Quantum computers will break today‘s most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. ..Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included. ..This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.. | 出版日期 | Book 2009 | 關(guān)鍵詞 | Computer Security; IT Security; cryptography; cryptology; post quantum cryptography; quantum computing; qu | 版次 | 1 | doi | https://doi.org/10.1007/978-3-540-88702-7 | isbn_softcover | 978-3-642-10019-2 | isbn_ebook | 978-3-540-88702-7 | copyright | Springer-Verlag Berlin Heidelberg 2009 |
The information of publication is updating
|
|