語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mathematical Modelling for Next-Gene...
~
Kunihiro, Noboru.
Mathematical Modelling for Next-Generation Cryptography = CREST Crypto-Math Project /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Mathematical Modelling for Next-Generation Cryptography/ edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong.
其他題名:
CREST Crypto-Math Project /
其他作者:
Takagi, Tsuyoshi.
面頁冊數:
VIII, 368 p. 23 illus., 6 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data structures (Computer science). -
電子資源:
https://doi.org/10.1007/978-981-10-5065-7
ISBN:
9789811050657
Mathematical Modelling for Next-Generation Cryptography = CREST Crypto-Math Project /
Mathematical Modelling for Next-Generation Cryptography
CREST Crypto-Math Project /[electronic resource] :edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong. - 1st ed. 2018. - VIII, 368 p. 23 illus., 6 illus. in color.online resource. - Mathematics for Industry,292198-350X ;. - Mathematics for Industry,18.
1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. .
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
ISBN: 9789811050657
Standard No.: 10.1007/978-981-10-5065-7doiSubjects--Topical Terms:
680370
Data structures (Computer science).
LC Class. No.: QA76.9.D35
Dewey Class. No.: 005.73
Mathematical Modelling for Next-Generation Cryptography = CREST Crypto-Math Project /
LDR
:03270nam a22004335i 4500
001
999016
003
DE-He213
005
20200707024654.0
007
cr nn 008mamaa
008
201225s2018 si | s |||| 0|eng d
020
$a
9789811050657
$9
978-981-10-5065-7
024
7
$a
10.1007/978-981-10-5065-7
$2
doi
035
$a
978-981-10-5065-7
050
4
$a
QA76.9.D35
050
4
$a
Q350-390
072
7
$a
UMB
$2
bicssc
072
7
$a
COM031000
$2
bisacsh
072
7
$a
UMB
$2
thema
072
7
$a
GPF
$2
thema
082
0 4
$a
005.73
$2
23
245
1 0
$a
Mathematical Modelling for Next-Generation Cryptography
$h
[electronic resource] :
$b
CREST Crypto-Math Project /
$c
edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong.
250
$a
1st ed. 2018.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2018.
300
$a
VIII, 368 p. 23 illus., 6 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Mathematics for Industry,
$x
2198-350X ;
$v
29
505
0
$a
1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. .
520
$a
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Computer security.
$3
557122
650
0
$a
Applied mathematics.
$3
1069907
650
0
$a
Engineering mathematics.
$3
562757
650
0
$a
Number theory.
$3
527883
650
0
$a
Quantum field theory.
$3
579915
650
0
$a
String theory.
$3
1254756
650
0
$a
Quantum physics.
$3
1179090
650
1 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Mathematical and Computational Engineering.
$3
1139415
650
2 4
$a
Number Theory.
$3
672023
650
2 4
$a
Quantum Field Theories, String Theory.
$3
768973
650
2 4
$a
Quantum Physics.
$3
671960
700
1
$a
Takagi, Tsuyoshi.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
716444
700
1
$a
Wakayama, Masato.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1269710
700
1
$a
Tanaka, Keisuke.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1067773
700
1
$a
Kunihiro, Noboru.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1290567
700
1
$a
Kimoto, Kazufumi.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1290568
700
1
$a
Duong, Dung Hoang.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1290569
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811050640
776
0 8
$i
Printed edition:
$z
9789811050664
776
0 8
$i
Printed edition:
$z
9789811353093
830
0
$a
Mathematics for Industry,
$x
2198-350X ;
$v
18
$3
1253518
856
4 0
$u
https://doi.org/10.1007/978-981-10-5065-7
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入