Published 2013
by Springer US, Imprint: Springer in Boston, MA .
Written in English
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.
Edition Notes
Statement | by Song Y. Yan |
Contributions | SpringerLink (Online service) |
Classifications | |
---|---|
LC Classifications | QA76.9.D35 |
The Physical Object | |
Format | [electronic resource] / |
Pagination | VIII, 207 p. 39 illus. |
Number of Pages | 207 |
ID Numbers | |
Open Library | OL27084027M |
ISBN 10 | 9781441977229 |
Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as Price: $ Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer m Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and by: Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cturer: Springer.
Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used. quantum resistant cryptosystems to replace the ifp dlp and ecdlp based cryptosystems this book is intended to be used either as a graduate text in computing communications and mathematics or as a quantum attacks on public key cryptosystems sep 19 posted by cao xueqin public library text id. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field. Quantum Attacks on Public-Key Cryptosystems (Hardcover)Brand: Song Y Yan. Quantum Attacks on Public-Key Cryptosystems by Song Y. Yan Author:Song Y. Yan, Date: April 8, ,Views: Author:Song Y. Yan Language: eng Format: epub Publisher: Springer US, Boston, MA (b) (c) Silver–Pohlig–Hellman algorithm to solve the discrete logarithms k: (a).
Quantum Public-Key Cryptosystems TatsuakiOkamoto,KeisukeTanaka,andShigenoriUchiyama NTTLaboratories Hikari-no-okaYokosuka-shi,Kanagawa-ken,Japan. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either Brand: Springer US. quantum attacks on public key cryptosystems Posted By Gérard de Villiers Publishing TEXT ID a Online PDF Ebook Epub Library quantum mechanics in contrast to traditional public key cryptography which relies on the computational difficulty of . Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge.