語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
International Symposium on Mathemati...
~
Takagi, Tsuyoshi.
International Symposium on Mathematics, Quantum Theory, and Cryptography = Proceedings of MQC 2019 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
International Symposium on Mathematics, Quantum Theory, and Cryptography/ edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu.
其他題名:
Proceedings of MQC 2019 /
其他作者:
Ikematsu, Yasuhiko.
面頁冊數:
XII, 274 p. 63 illus., 23 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Systems and Data Security. -
電子資源:
https://doi.org/10.1007/978-981-15-5191-8
ISBN:
9789811551918
International Symposium on Mathematics, Quantum Theory, and Cryptography = Proceedings of MQC 2019 /
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019 /[electronic resource] :edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu. - 1st ed. 2021. - XII, 274 p. 63 illus., 23 illus. in color.online resource. - Mathematics for Industry,332198-3518 ;. - Mathematics for Industry,18.
Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
Open Access
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
ISBN: 9789811551918
Standard No.: 10.1007/978-981-15-5191-8doiSubjects--Topical Terms:
677062
Systems and Data Security.
LC Class. No.: TA329-348
Dewey Class. No.: 519
International Symposium on Mathematics, Quantum Theory, and Cryptography = Proceedings of MQC 2019 /
LDR
:03601nam a22004455i 4500
001
1046446
003
DE-He213
005
20210921212955.0
007
cr nn 008mamaa
008
220103s2021 si | s |||| 0|eng d
020
$a
9789811551918
$9
978-981-15-5191-8
024
7
$a
10.1007/978-981-15-5191-8
$2
doi
035
$a
978-981-15-5191-8
050
4
$a
TA329-348
050
4
$a
TA640-643
072
7
$a
TBJ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
TBJ
$2
thema
082
0 4
$a
519
$2
23
245
1 0
$a
International Symposium on Mathematics, Quantum Theory, and Cryptography
$h
[electronic resource] :
$b
Proceedings of MQC 2019 /
$c
edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu.
250
$a
1st ed. 2021.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
XII, 274 p. 63 illus., 23 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Mathematics for Industry,
$x
2198-3518 ;
$v
33
505
0
$a
Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
506
0
$a
Open Access
520
$a
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Quantum Computing.
$3
883739
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
1 4
$a
Mathematical and Computational Engineering.
$3
1139415
650
0
$a
Computer security.
$3
557122
650
0
$a
Quantum computers.
$3
564139
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Engineering mathematics.
$3
562757
650
0
$a
Applied mathematics.
$3
1069907
700
1
$a
Ikematsu, Yasuhiko.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1349985
700
1
$a
Kimoto, Kazufumi.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1290568
700
1
$a
Kunihiro, Noboru.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1290567
700
1
$a
Tanaka, Keisuke.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1067773
700
1
$a
Wakayama, Masato.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1269710
700
1
$a
Takagi, Tsuyoshi.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
716444
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811551901
776
0 8
$i
Printed edition:
$z
9789811551925
776
0 8
$i
Printed edition:
$z
9789811551932
830
0
$a
Mathematics for Industry,
$x
2198-350X ;
$v
18
$3
1253518
856
4 0
$u
https://doi.org/10.1007/978-981-15-5191-8
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
912
$a
ZDB-2-SOB
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入