Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
Advances in Information Security

Multivariate Public Key Cryptosystems

Jintai Ding والمزيد
    • ‏119٫99 US$
    • ‏119٫99 US$

وصف الناشر

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative.

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٦
٢٤ نوفمبر
اللغة
EN
الإنجليزية
عدد الصفحات
٢٧٨
الناشر
Springer US
البائع
Springer Nature B.V.
الحجم
٨٫٣
‫م.ب.‬
Arithmetic of Finite Fields Arithmetic of Finite Fields
٢٠٠٧
Candidate Multilinear Maps Candidate Multilinear Maps
٢٠١٥
The LLL Algorithm The LLL Algorithm
٢٠٠٩
Post-Quantum Cryptography Post-Quantum Cryptography
٢٠٠٨
Pairing-Based Cryptography – Pairing 2008 Pairing-Based Cryptography – Pairing 2008
٢٠٠٨
Algebraic Aspects of the Advanced Encryption Standard Algebraic Aspects of the Advanced Encryption Standard
٢٠٠٦
Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
٢٠٢٠
Post-Quantum Cryptography Post-Quantum Cryptography
٢٠٠٨
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks Security for Telecommunications Networks
٢٠٠٨
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
٢٠٠٧
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
٢٠١٥
Network Security Policies and Procedures Network Security Policies and Procedures
٢٠٠٧