Quantum Attacks on Public-Key Cryptosystems

Nonfiction, Computers, Advanced Computing, Theory, Networking & Communications, Computer Security, General Computing
Cover of the book Quantum Attacks on Public-Key Cryptosystems by Song Y. Yan, Springer US
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Song Y. Yan ISBN: 9781441977229
Publisher: Springer US Publication: July 8, 2014
Imprint: Springer Language: English
Author: Song Y. Yan
ISBN: 9781441977229
Publisher: Springer US
Publication: July 8, 2014
Imprint: Springer
Language: English

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

More books from Springer US

Cover of the book A Practical Guide to Real-Time Office Sonography in Obstetrics and Gynecology by Song Y. Yan
Cover of the book Contemporary Nephrology by Song Y. Yan
Cover of the book Computational Techniques for the Summation of Series by Song Y. Yan
Cover of the book Polymer Membranes for Fuel Cells by Song Y. Yan
Cover of the book Here the People Rule by Song Y. Yan
Cover of the book VLSI Synthesis of DSP Kernels by Song Y. Yan
Cover of the book Structure Determination by X-ray Crystallography by Song Y. Yan
Cover of the book Sampling Inner Experience in Disturbed Affect by Song Y. Yan
Cover of the book Heart Cell Coupling and Impulse Propagation in Health and Disease by Song Y. Yan
Cover of the book Principles of Diabetes Mellitus by Song Y. Yan
Cover of the book Anesthesia for Renal Transplantation by Song Y. Yan
Cover of the book Design of Low-Voltage CMOS Switched-Opamp Switched-Capacitor Systems by Song Y. Yan
Cover of the book Chinese Children’s Reading Acquisition by Song Y. Yan
Cover of the book Stepfamily Relationships by Song Y. Yan
Cover of the book In-Vehicle Corpus and Signal Processing for Driver Behavior by Song Y. Yan
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy