Atjaunināt sīkdatņu piekrišanu

E-grāmata: Quantum Attacks on Public-Key Cryptosystems

  • Formāts: PDF+DRM
  • Izdošanas datums: 08-Jul-2014
  • Izdevniecība: Springer-Verlag New York Inc.
  • Valoda: eng
  • ISBN-13: 9781441977229
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 08-Jul-2014
  • Izdevniecība: Springer-Verlag New York Inc.
  • Valoda: eng
  • ISBN-13: 9781441977229

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.



This book introduces basic concepts and ideas of quantum computing and quantum computational complexity. It discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystems and covers many alternative post-quantum cryptosystems.

Recenzijas

From the reviews:

The book offers a detailed overview of the main intractable problems which ensure security of usual cryptosystems and the way to solve them using quantum calculus. It can be very well used as a course for undergraduate students, many notions being self-contained . book is very interesting, easily to be followed, pedagogically constructed. It offers a good source of information, being an excellent support for students and researchers who wish to find general details about the new paradigm of computation . (Adrian Atanasiu, zbMATH, Vol. 1273, 2013)

1 Classic and Quantum Computation
1(30)
1.1 Classical Computability Theory
1(6)
1.2 Classical Complexity Theory
7(8)
1.3 Quantum Information and Computation
15(6)
1.4 Quantum Computability and Complexity
21(5)
1.5 Conclusions, Notes, and Further Reading
26(5)
References
28(3)
2 Quantum Attacks on IFP-Based Cryptosystems
31(62)
2.1 IFP and Classical Solutions to IFP
31(21)
2.2 IFP-Based Cryptography
52(20)
2.3 Quantum Attacks on IFP and IFP-Based Cryptography
72(14)
2.4 Conclusions, Notes, and Further Reading
86(7)
References
86(7)
3 Quantum Attacks on DLP-Based Cryptosystems
93(44)
3.1 DLP and Classic Solutions to DLP
93(16)
3.2 DLP-Based Cryptography
109(13)
3.3 Quantum Attack on DLP and DLP-Based Cryptography
122(9)
3.4 Conclusions, Notes, and Further Reading
131(6)
References
132(5)
4 Quantum Attacks on ECDLP-Based Cryptosystems
137(52)
4.1 ECDLP and Classical Solutions
137(14)
4.2 ECDLP-Based Cryptography
151(22)
4.3 Quantum Attack on ECDLP-Based Cryptography
173(11)
4.4 Conclusions, Notes, and Further Reading
184(5)
References
185(4)
5 Quantum Resistant Cryptosystems
189(16)
5.1 Quantum-Computing Attack Resistant
189(1)
5.2 Coding-Based Cryptosystems
190(2)
5.3 Lattice-Based Cryptosystems
192(2)
5.4 Quantum Cryptosystems
194(2)
5.5 DNA Biological Cryptography
196(3)
5.6 Conclusions, Notes, and Further Reading
199(6)
References
200(5)
Index 205(2)
About the Author 207