Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
Computer Architecture and Design Methodologies

Implementation and Analysis of Ciphers in Quantum Computing

    • $119.99
    • $119.99

Publisher Description

This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an ever-growing need to analyze the ciphers that are being employed in ensuring security. The symmetric key ciphers are generally considered safe against quantum computers, though one must consider the possible impact due to Grover's search algorithm (that reduces the security claim to the square root bound of what is expected against a classical computer). This book consolidates all the major research works in one place and presents it with adequate clarity, making the subject matter easy to understand for seasoned researchers and students alike. It covers the prerequisite information, new research works (including some of the state of the art), thought-provoking problems for further research, and all the relevant source codes. This book is interesting to engineers, researchers, and students who work/study in the field of cryptography.

GENRE
Professional & Technical
RELEASED
2024
April 17
LANGUAGE
EN
English
LENGTH
165
Pages
PUBLISHER
Springer Nature Singapore
SELLER
Springer Nature B.V.
SIZE
13.8
MB

More Books by Anubhab Baksi & Kyungbae Jang

Other Books in This Series

Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
2022
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
2022
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
2022
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
2021
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
2019
Modeling and Simulation of Invasive Applications and Architectures Modeling and Simulation of Invasive Applications and Architectures
2019