Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
Computer Architecture and Design Methodologies

Implementation and Analysis of Ciphers in Quantum Computing

    • ‏129٫99 US$
    • ‏129٫99 US$

وصف الناشر

This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an ever-growing need to analyze the ciphers that are being employed in ensuring security. The symmetric key ciphers are generally considered safe against quantum computers, though one must consider the possible impact due to Grover's search algorithm (that reduces the security claim to the square root bound of what is expected against a classical computer). This book consolidates all the major research works in one place and presents it with adequate clarity, making the subject matter easy to understand for seasoned researchers and students alike. It covers the prerequisite information, new research works (including some of the state of the art), thought-provoking problems for further research, and all the relevant source codes. This book is interesting to engineers, researchers, and students who work/study in the field of cryptography.

النوع
تخصصات مهنية وتقنية
تاريخ النشر
٢٠٢٤
١٧ أبريل
اللغة
EN
الإنجليزية
عدد الصفحات
١٦٥
الناشر
Springer Nature Singapore
البائع
Springer Nature B.V.
الحجم
١٣٫٨
‫م.ب.‬
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
٢٠٢٢
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
٢٠٢٢
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
٢٠٢٢
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
٢٠٢١
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
٢٠١٩
Modeling and Simulation of Invasive Applications and Architectures Modeling and Simulation of Invasive Applications and Architectures
٢٠١٩