Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
Computer Architecture and Design Methodologies

Implementation and Analysis of Ciphers in Quantum Computing

    • US$129.99
    • US$129.99

출판사 설명

This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an ever-growing need to analyze the ciphers that are being employed in ensuring security. The symmetric key ciphers are generally considered safe against quantum computers, though one must consider the possible impact due to Grover's search algorithm (that reduces the security claim to the square root bound of what is expected against a classical computer). This book consolidates all the major research works in one place and presents it with adequate clarity, making the subject matter easy to understand for seasoned researchers and students alike. It covers the prerequisite information, new research works (including some of the state of the art), thought-provoking problems for further research, and all the relevant source codes. This book is interesting to engineers, researchers, and students who work/study in the field of cryptography.

장르
전문직 및 기술
출시일
2024년
4월 17일
언어
EN
영어
길이
165
페이지
출판사
Springer Nature Singapore
판매자
Springer Nature B.V.
크기
13.8
MB
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
2022년
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
2022년
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
2022년
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
2021년
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
2019년
Modeling and Simulation of Invasive Applications and Architectures Modeling and Simulation of Invasive Applications and Architectures
2019년