找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Quantum Attacks on Public-Key Cryptosystems; Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp

[復(fù)制鏈接]
查看: 35712|回復(fù): 35
樓主
發(fā)表于 2025-3-21 19:18:35 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Quantum Attacks on Public-Key Cryptosystems
編輯Song Y. Yan
視頻videohttp://file.papertrans.cn/782/781046/781046.mp4
概述Discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystems.Covers many alternative post-quantum cryptosystems to replace the classic IFP, DLP and ECDLP based crypt
圖書封面Titlebook: Quantum Attacks on Public-Key Cryptosystems;  Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp
描述.The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists..Quantum Attacks on Public-Key Cryptosystems. presemts almost all?known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems..This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field..
出版日期Book 2013
關(guān)鍵詞Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
版次1
doihttps://doi.org/10.1007/978-1-4419-7722-9
isbn_softcover978-1-4899-9779-1
isbn_ebook978-1-4419-7722-9
copyrightSpringer Science+Business Media, LLC 2013
The information of publication is updating

書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)




書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:32:11 | 只看該作者
Song Y. Yanlth care costs and increasing demands to accomplish more with less financial support. Treatment costs can be reduced and health improved by preventing the toxic effects of drugs. This first volume of our new series, Drug and Alcohol to reduce the use and Abuse Reviews, focuses on stategies abuse of
板凳
發(fā)表于 2025-3-22 02:38:23 | 只看該作者
Song Y. Yanecher, 1972; Brill and Lieberman, 1972; Sells, 1974). Neither the medical model, which is considered by some to exacerbate the problem (Cummings, 1979), nor traditional psychotherapy, which too narrowly embraces the diversity of problems associated with drug abuse (Hughes, 1977), have been reported
地板
發(fā)表于 2025-3-22 05:48:51 | 只看該作者
5#
發(fā)表于 2025-3-22 09:44:10 | 只看該作者
dership, appropriate patients, experienced investigators, a good dose of common sense, a vision of the future, and some luck to develop significant new products. Many companies may possess these attributes; however, how well companies can pull all these manifold, often disparate, and sometimes confl
6#
發(fā)表于 2025-3-22 16:56:43 | 只看該作者
Quantum Attacks on DLP-Based Cryptosystems,P-based cryptographic systems and protocols whose security depends on the infeasibility of the DLP problem. Finally, we shall discuss a quantum approach to attacking both the DLP problem and the DLP-based cryptography.
7#
發(fā)表于 2025-3-22 19:50:21 | 只看該作者
8#
發(fā)表于 2025-3-22 21:25:30 | 只看該作者
9#
發(fā)表于 2025-3-23 02:17:20 | 只看該作者
https://doi.org/10.1007/978-1-4419-7722-9Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
10#
發(fā)表于 2025-3-23 08:03:53 | 只看該作者
978-1-4899-9779-1Springer Science+Business Media, LLC 2013
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-5 07:43
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
永州市| 静宁县| 池州市| 肇庆市| 绥德县| 行唐县| SHOW| 无极县| 温泉县| 龙陵县| 莱州市| 高青县| 杭锦后旗| 广安市| 塔河县| 凤山市| 会昌县| 宁海县| 晋城| 泰和县| 宜宾县| 宝丰县| 汾阳市| 历史| 鄢陵县| 曲阳县| 砀山县| 祁连县| 阜城县| 泗阳县| 阳东县| 麦盖提县| 青冈县| 寻甸| 介休市| 凤台县| 曲阜市| 福海县| 安塞县| 花莲市| 六盘水市|