找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Quantum Attacks on Public-Key Cryptosystems; Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp

[復(fù)制鏈接]
查看: 35710|回復(fù): 35
樓主
發(fā)表于 2025-3-21 19:18:35 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Quantum Attacks on Public-Key Cryptosystems
編輯Song Y. Yan
視頻videohttp://file.papertrans.cn/782/781046/781046.mp4
概述Discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystems.Covers many alternative post-quantum cryptosystems to replace the classic IFP, DLP and ECDLP based crypt
圖書封面Titlebook: Quantum Attacks on Public-Key Cryptosystems;  Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp
描述.The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists..Quantum Attacks on Public-Key Cryptosystems. presemts almost all?known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems..This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field..
出版日期Book 2013
關(guān)鍵詞Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
版次1
doihttps://doi.org/10.1007/978-1-4419-7722-9
isbn_softcover978-1-4899-9779-1
isbn_ebook978-1-4419-7722-9
copyrightSpringer Science+Business Media, LLC 2013
The information of publication is updating

書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)




書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:32:11 | 只看該作者
Song Y. Yanlth care costs and increasing demands to accomplish more with less financial support. Treatment costs can be reduced and health improved by preventing the toxic effects of drugs. This first volume of our new series, Drug and Alcohol to reduce the use and Abuse Reviews, focuses on stategies abuse of
板凳
發(fā)表于 2025-3-22 02:38:23 | 只看該作者
Song Y. Yanecher, 1972; Brill and Lieberman, 1972; Sells, 1974). Neither the medical model, which is considered by some to exacerbate the problem (Cummings, 1979), nor traditional psychotherapy, which too narrowly embraces the diversity of problems associated with drug abuse (Hughes, 1977), have been reported
地板
發(fā)表于 2025-3-22 05:48:51 | 只看該作者
5#
發(fā)表于 2025-3-22 09:44:10 | 只看該作者
dership, appropriate patients, experienced investigators, a good dose of common sense, a vision of the future, and some luck to develop significant new products. Many companies may possess these attributes; however, how well companies can pull all these manifold, often disparate, and sometimes confl
6#
發(fā)表于 2025-3-22 16:56:43 | 只看該作者
Quantum Attacks on DLP-Based Cryptosystems,P-based cryptographic systems and protocols whose security depends on the infeasibility of the DLP problem. Finally, we shall discuss a quantum approach to attacking both the DLP problem and the DLP-based cryptography.
7#
發(fā)表于 2025-3-22 19:50:21 | 只看該作者
8#
發(fā)表于 2025-3-22 21:25:30 | 只看該作者
9#
發(fā)表于 2025-3-23 02:17:20 | 只看該作者
https://doi.org/10.1007/978-1-4419-7722-9Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
10#
發(fā)表于 2025-3-23 08:03:53 | 只看該作者
978-1-4899-9779-1Springer Science+Business Media, LLC 2013
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-5 05:55
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
灵宝市| 溧阳市| 建阳市| 集贤县| 四会市| 宜兴市| 依兰县| 湖北省| 新建县| 彭山县| 五家渠市| 襄樊市| 绥江县| 岳普湖县| 阜阳市| 炎陵县| 会理县| 麻江县| 中江县| 遂溪县| 社旗县| 莲花县| 仁布县| 锡林郭勒盟| 哈密市| 墨竹工卡县| 刚察县| 渝中区| 太湖县| 昌黎县| 江津市| 本溪市| 昭苏县| 凤凰县| 西青区| 莆田市| 孝感市| 兰考县| 公主岭市| 商河县| 梧州市|