Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
Advances in Information Security

Multivariate Public Key Cryptosystems

Jintai Ding và các tác giả khác
    • 119,99 US$
    • 119,99 US$

Lời Giới Thiệu Của Nhà Xuất Bản

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative.

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.

THỂ LOẠI
Máy Vi Tính & Internet
ĐÃ PHÁT HÀNH
2006
24 tháng 11
NGÔN NGỮ
EN
Tiếng Anh
ĐỘ DÀI
278
Trang
NHÀ XUẤT BẢN
Springer US
NGƯỜI BÁN
Springer Nature B.V.
KÍCH THƯỚC
8,3
Mb
Arithmetic of Finite Fields Arithmetic of Finite Fields
2007
Candidate Multilinear Maps Candidate Multilinear Maps
2015
The LLL Algorithm The LLL Algorithm
2009
Post-Quantum Cryptography Post-Quantum Cryptography
2008
Pairing-Based Cryptography – Pairing 2008 Pairing-Based Cryptography – Pairing 2008
2008
Algebraic Aspects of the Advanced Encryption Standard Algebraic Aspects of the Advanced Encryption Standard
2006
Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
2020
Post-Quantum Cryptography Post-Quantum Cryptography
2008
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007