000 03690naaaa2200685uu 4500
001 https://directory.doabooks.org/handle/20.500.12854/25889
005 20220219184140.0
020 _a978-981-15-5191-8
024 7 _a10.1007/978-981-15-5191-8
_cdoi
041 0 _aEnglish
042 _adc
072 7 _aTBJ
_2bicssc
072 7 _aUMB
_2bicssc
072 7 _aUYA
_2bicssc
072 7 _aUR
_2bicssc
100 1 _aTakagi, Tsuyoshi
_4edt
700 1 _aWakayama, Masato
_4edt
700 1 _aTanaka, Keisuke
_4edt
700 1 _aKunihiro, Noboru
_4edt
700 1 _aKimoto, Kazufumi
_4edt
700 1 _aIkematsu, Yasuhiko
_4edt
700 1 _aTakagi, Tsuyoshi
_4oth
700 1 _aWakayama, Masato
_4oth
700 1 _aTanaka, Keisuke
_4oth
700 1 _aKunihiro, Noboru
_4oth
700 1 _aKimoto, Kazufumi
_4oth
700 1 _aIkematsu, Yasuhiko
_4oth
245 1 0 _aInternational Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019
260 _bSpringer Nature
_c2021
300 _a1 electronic resource (274 p.)
506 0 _aOpen Access
_2star
_fUnrestricted online access
520 _aThis open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
540 _aCreative Commons
_fby/4.0/
_2cc
_4http://creativecommons.org/licenses/by/4.0/
546 _aEnglish
650 7 _aMaths for engineers
_2bicssc
650 7 _aAlgorithms & data structures
_2bicssc
650 7 _aMathematical theory of computation
_2bicssc
650 7 _aComputer security
_2bicssc
653 _aMathematical and Computational Engineering
653 _aData Structures and Information Theory
653 _aQuantum Computing
653 _aSystems and Data Security
653 _aMathematical and Computational Engineering Applications
653 _aData and Information Security
653 _aCryptography for Quantum Computers
653 _aPost-quantum Cryptography
653 _aNumber Theory
653 _aRepresentation Theory
653 _aQuantum Physics
653 _aSecurity Modelling
653 _aOpen Access
653 _aMaths for engineers
653 _aAlgorithms & data structures
653 _aInformation theory
653 _aMathematical theory of computation
653 _aComputer security
653 _aNetwork security
856 4 0 _awww.oapen.org
_uhttps://library.oapen.org/bitstream/20.500.12657/42930/1/2021_Book_InternationalSymposiumOnMathem.pdf
_70
_zDOAB: download the publication
856 4 0 _awww.oapen.org
_uhttps://directory.doabooks.org/handle/20.500.12854/25889
_70
_zDOAB: description of the publication
999 _c36072
_d36072