Cover of: Quantum Attacks on Public-Key Cryptosystems | Song Y. Yan Read Online
Share

Quantum Attacks on Public-Key Cryptosystems by Song Y. Yan

  • 461 Want to read
  • ·
  • 87 Currently reading

Published by Springer US, Imprint: Springer in Boston, MA .
Written in English

Subjects:

  • Cryptology and Information Theory Data Structures,
  • Algebra,
  • Computer software,
  • Symbolic and Algebraic Manipulation,
  • Data structures (Computer science),
  • Algorithm Analysis and Problem Complexity,
  • Computer Communication Networks,
  • Data Encryption,
  • Data encryption (Computer science),
  • Data processing,
  • Mathematics of Computing,
  • Computer science

Book details:

About the Edition

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Edition Notes

Statementby Song Y. Yan
ContributionsSpringerLink (Online service)
Classifications
LC ClassificationsQA76.9.D35
The Physical Object
Format[electronic resource] /
PaginationVIII, 207 p. 39 illus.
Number of Pages207
ID Numbers
Open LibraryOL27084027M
ISBN 109781441977229

Download Quantum Attacks on Public-Key Cryptosystems

PDF EPUB FB2 MOBI RTF

Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as Price: $ Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.   However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer m Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and by:   Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cturer: Springer.

Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used. quantum resistant cryptosystems to replace the ifp dlp and ecdlp based cryptosystems this book is intended to be used either as a graduate text in computing communications and mathematics or as a quantum attacks on public key cryptosystems sep 19 posted by cao xueqin public library text id. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field. Quantum Attacks on Public-Key Cryptosystems (Hardcover)Brand: Song Y Yan. Quantum Attacks on Public-Key Cryptosystems by Song Y. Yan Author:Song Y. Yan, Date: April 8, ,Views: Author:Song Y. Yan Language: eng Format: epub Publisher: Springer US, Boston, MA (b) (c) Silver–Pohlig–Hellman algorithm to solve the discrete logarithms k: (a).

Quantum Public-Key Cryptosystems TatsuakiOkamoto,KeisukeTanaka,andShigenoriUchiyama NTTLaboratories Hikari-no-okaYokosuka-shi,Kanagawa-ken,Japan.   Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either Brand: Springer US. quantum attacks on public key cryptosystems Posted By Gérard de Villiers Publishing TEXT ID a Online PDF Ebook Epub Library quantum mechanics in contrast to traditional public key cryptography which relies on the computational difficulty of .   Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge.