| 000 | 03690naaaa2200685uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/25889 | ||
| 005 | 20220219184140.0 | ||
| 020 | _a978-981-15-5191-8 | ||
| 024 | 7 |
_a10.1007/978-981-15-5191-8 _cdoi |
|
| 041 | 0 | _aEnglish | |
| 042 | _adc | ||
| 072 | 7 |
_aTBJ _2bicssc |
|
| 072 | 7 |
_aUMB _2bicssc |
|
| 072 | 7 |
_aUYA _2bicssc |
|
| 072 | 7 |
_aUR _2bicssc |
|
| 100 | 1 |
_aTakagi, Tsuyoshi _4edt |
|
| 700 | 1 |
_aWakayama, Masato _4edt |
|
| 700 | 1 |
_aTanaka, Keisuke _4edt |
|
| 700 | 1 |
_aKunihiro, Noboru _4edt |
|
| 700 | 1 |
_aKimoto, Kazufumi _4edt |
|
| 700 | 1 |
_aIkematsu, Yasuhiko _4edt |
|
| 700 | 1 |
_aTakagi, Tsuyoshi _4oth |
|
| 700 | 1 |
_aWakayama, Masato _4oth |
|
| 700 | 1 |
_aTanaka, Keisuke _4oth |
|
| 700 | 1 |
_aKunihiro, Noboru _4oth |
|
| 700 | 1 |
_aKimoto, Kazufumi _4oth |
|
| 700 | 1 |
_aIkematsu, Yasuhiko _4oth |
|
| 245 | 1 | 0 | _aInternational Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019 |
| 260 |
_bSpringer Nature _c2021 |
||
| 300 | _a1 electronic resource (274 p.) | ||
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aThis open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography. | ||
| 540 |
_aCreative Commons _fby/4.0/ _2cc _4http://creativecommons.org/licenses/by/4.0/ |
||
| 546 | _aEnglish | ||
| 650 | 7 |
_aMaths for engineers _2bicssc |
|
| 650 | 7 |
_aAlgorithms & data structures _2bicssc |
|
| 650 | 7 |
_aMathematical theory of computation _2bicssc |
|
| 650 | 7 |
_aComputer security _2bicssc |
|
| 653 | _aMathematical and Computational Engineering | ||
| 653 | _aData Structures and Information Theory | ||
| 653 | _aQuantum Computing | ||
| 653 | _aSystems and Data Security | ||
| 653 | _aMathematical and Computational Engineering Applications | ||
| 653 | _aData and Information Security | ||
| 653 | _aCryptography for Quantum Computers | ||
| 653 | _aPost-quantum Cryptography | ||
| 653 | _aNumber Theory | ||
| 653 | _aRepresentation Theory | ||
| 653 | _aQuantum Physics | ||
| 653 | _aSecurity Modelling | ||
| 653 | _aOpen Access | ||
| 653 | _aMaths for engineers | ||
| 653 | _aAlgorithms & data structures | ||
| 653 | _aInformation theory | ||
| 653 | _aMathematical theory of computation | ||
| 653 | _aComputer security | ||
| 653 | _aNetwork security | ||
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/42930/1/2021_Book_InternationalSymposiumOnMathem.pdf _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/25889 _70 _zDOAB: description of the publication |
| 999 |
_c36072 _d36072 |
||