skip to content
Quantum attacks on public-key cryptosystems Preview this item
ClosePreview this item
Checking...

Quantum attacks on public-key cryptosystems

Author: Song Y Yan
Publisher: New York : Springer, [2013]
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version: Yan, Song Y.
Quantum attacks on public-key cryptosystems.
New York : Springer, [2013]
(DLC) 2013935220
(OCoLC)668190641
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Song Y Yan
ISBN: 9781441977229 1441977228 144197721X 9781441977212
OCLC Number: 841769613
Notes: Includes index.
Description: 1 online resource (viii, 207 pages) : illustrations
Contents: Classic and Quantum Computation --
Quantum Attacks on IFP-Based Cryptosystems --
Quantum Attacks on DLP-Based Cryptosystems --
Quantum Attacks on ECDLP-Based Cryptosystems --
Quantum Resistant Cryptosystems.
Responsibility: Song Y. Yan.

Abstract:

This book introduces basic concepts and ideas of quantum computing and quantum computational complexity. It discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key  Read more...

Reviews

Editorial reviews

Publisher Synopsis

From the reviews: "The book offers a detailed overview of the main intractable problems which ensure security of usual cryptosystems ... and the way to solve them using quantum calculus. ... It can Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/841769613>
library:oclcnum"841769613"
library:placeOfPublication
rdf:typeschema:MediaObject
rdf:typeschema:Book
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:creator
schema:datePublished"2013"
schema:description"The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/678791788>
schema:genre"Electronic books"@en
schema:inLanguage"en"
schema:name"Quantum attacks on public-key cryptosystems"@en
schema:url<http://dx.doi.org/10.1007/978-1-4419-7722-9>
schema:url<http://site.ebrary.com/id/10695736>
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.