Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
Advances in Information Security

Multivariate Public Key Cryptosystems

Jintai Ding and Others
    • $159.99
    • $159.99

Publisher Description

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative.

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.

GENRE
Computing & Internet
RELEASED
2006
24 November
LANGUAGE
EN
English
LENGTH
278
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
8.3
MB

More Books Like This

Candidate Multilinear Maps Candidate Multilinear Maps
2015
The LLL Algorithm The LLL Algorithm
2009
Post-Quantum Cryptography Post-Quantum Cryptography
2008
Pairing-Based Cryptography – Pairing 2008 Pairing-Based Cryptography – Pairing 2008
2008
Algebraic Aspects of the Advanced Encryption Standard Algebraic Aspects of the Advanced Encryption Standard
2006
Mathematical Methods in Computer Science Mathematical Methods in Computer Science
2008

More Books by Jintai Ding, Jason E. Gower & Dieter S. Schmidt

Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
2020
Post-Quantum Cryptography Post-Quantum Cryptography
2008

Other Books in This Series

Fog/Edge Computing For Security, Privacy, and Applications Fog/Edge Computing For Security, Privacy, and Applications
2021
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
2020
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Evolution of Cyber Technologies and Operations to 2035 Evolution of Cyber Technologies and Operations to 2035
2015
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024