找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Quantum Attacks on Public-Key Cryptosystems; Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp

[復(fù)制鏈接]
查看: 35712|回復(fù): 35
樓主
發(fā)表于 2025-3-21 19:18:35 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Quantum Attacks on Public-Key Cryptosystems
編輯Song Y. Yan
視頻videohttp://file.papertrans.cn/782/781046/781046.mp4
概述Discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystems.Covers many alternative post-quantum cryptosystems to replace the classic IFP, DLP and ECDLP based crypt
圖書封面Titlebook: Quantum Attacks on Public-Key Cryptosystems;  Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp
描述.The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists..Quantum Attacks on Public-Key Cryptosystems. presemts almost all?known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems..This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field..
出版日期Book 2013
關(guān)鍵詞Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
版次1
doihttps://doi.org/10.1007/978-1-4419-7722-9
isbn_softcover978-1-4899-9779-1
isbn_ebook978-1-4419-7722-9
copyrightSpringer Science+Business Media, LLC 2013
The information of publication is updating

書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)




書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:32:11 | 只看該作者
Song Y. Yanlth care costs and increasing demands to accomplish more with less financial support. Treatment costs can be reduced and health improved by preventing the toxic effects of drugs. This first volume of our new series, Drug and Alcohol to reduce the use and Abuse Reviews, focuses on stategies abuse of
板凳
發(fā)表于 2025-3-22 02:38:23 | 只看該作者
Song Y. Yanecher, 1972; Brill and Lieberman, 1972; Sells, 1974). Neither the medical model, which is considered by some to exacerbate the problem (Cummings, 1979), nor traditional psychotherapy, which too narrowly embraces the diversity of problems associated with drug abuse (Hughes, 1977), have been reported
地板
發(fā)表于 2025-3-22 05:48:51 | 只看該作者
5#
發(fā)表于 2025-3-22 09:44:10 | 只看該作者
dership, appropriate patients, experienced investigators, a good dose of common sense, a vision of the future, and some luck to develop significant new products. Many companies may possess these attributes; however, how well companies can pull all these manifold, often disparate, and sometimes confl
6#
發(fā)表于 2025-3-22 16:56:43 | 只看該作者
Quantum Attacks on DLP-Based Cryptosystems,P-based cryptographic systems and protocols whose security depends on the infeasibility of the DLP problem. Finally, we shall discuss a quantum approach to attacking both the DLP problem and the DLP-based cryptography.
7#
發(fā)表于 2025-3-22 19:50:21 | 只看該作者
8#
發(fā)表于 2025-3-22 21:25:30 | 只看該作者
9#
發(fā)表于 2025-3-23 02:17:20 | 只看該作者
https://doi.org/10.1007/978-1-4419-7722-9Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
10#
發(fā)表于 2025-3-23 08:03:53 | 只看該作者
978-1-4899-9779-1Springer Science+Business Media, LLC 2013
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-5 07:43
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
昌图县| 西平县| 许昌县| 马公市| 沙坪坝区| 清苑县| 民乐县| 芜湖市| 鸡西市| 富平县| 台州市| 南江县| 五寨县| 东明县| 台南市| 宁国市| 重庆市| 洛隆县| 兴城市| 明水县| 云南省| 广平县| 象山县| 抚州市| 桂阳县| 怀化市| 大竹县| 靖边县| 肃宁县| 嵊州市| 淅川县| 红安县| 甘肃省| 城步| 石林| 镇雄县| 肃南| 三穗县| 奉节县| 古蔺县| 沂水县|