Interactions between Group Theory, Symmetry and Cryptology (Record no. 80240)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03901naaaa2200721uu 4500 |
| 001 - CONTROL NUMBER | |
| control field | https://directory.doabooks.org/handle/20.500.12854/50457 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220220100414.0 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | books978-3-03928-803-8 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783039288038 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783039288021 |
| 024 7# - OTHER STANDARD IDENTIFIER | |
| Standard number or code | 10.3390/books978-3-03928-803-8 |
| Terms of availability | doi |
| 041 0# - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | dc |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | González Vasco, María Isabel |
| Relationship | auth |
| 245 10 - TITLE STATEMENT | |
| Title | Interactions between Group Theory, Symmetry and Cryptology |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | MDPI - Multidisciplinary Digital Publishing Institute |
| Date of publication, distribution, etc. | 2020 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 electronic resource (164 p.) |
| 506 0# - RESTRICTIONS ON ACCESS NOTE | |
| Terms governing access | Open Access |
| Source of term | star |
| Standardized terminology for access restriction | Unrestricted online access |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks. |
| 540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
| Terms governing use and reproduction | Creative Commons |
| Use and reproduction rights | https://creativecommons.org/licenses/by-nc-nd/4.0/ |
| Source of term | cc |
| -- | https://creativecommons.org/licenses/by-nc-nd/4.0/ |
| 546 ## - LANGUAGE NOTE | |
| Language note | English |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | NP-Completeness |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | protocol compiler |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | post-quantum cryptography |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Reed–Solomon codes |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | key equation |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | euclidean algorithm |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | permutation group |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | t-modified self-shrinking generator |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | ideal cipher model |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | algorithms in groups |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | lightweight cryptography |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | generalized self-shrinking generator |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | numerical semigroup |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | pseudo-random number generator |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | symmetry |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | pseudorandom permutation |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Berlekamp–Massey algorithm |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | semigroup ideal |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | algebraic-geometry code |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | non-commutative cryptography |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | provable security |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Engel words |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | block cipher |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | cryptography |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | beyond birthday bound |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Weierstrass semigroup |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | group theory |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | braid groups |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | statistical randomness tests |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | group-based cryptography |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | alternating group |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | WalnutDSA |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Sugiyama et al. algorithm |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | cryptanalysis |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | digital signatures |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | one-way functions |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | key agreement protocol |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | error-correcting code |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | group key establishment |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://mdpi.com/books/pdfview/book/2232">https://mdpi.com/books/pdfview/book/2232</a> |
| Access status | 0 |
| Public note | DOAB: download the publication |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://directory.doabooks.org/handle/20.500.12854/50457">https://directory.doabooks.org/handle/20.500.12854/50457</a> |
| Access status | 0 |
| Public note | DOAB: description of the publication |
No items available.
