OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle
Bookmark Share

Electronic Resource

Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle

Zhiyong Zheng - Personal Name; Kun Tian - Personal Name; Fengxia Liu - Personal Name;

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography.
This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.


Availability
#
My Library (oer.unej.ac.id) Location name is not set
1006112025
Available - and the nature and attribution
Detail Information
Series Title
-
Call Number
-
Publisher
: Springer Singapore., 2023
Collation
XI, 191 hlm; ill., lamp.,
Language
English
ISBN/ISSN
9789811976445
Classification
-
Content Type
text
Media Type
computer
Carrier Type
online resource
Edition
1
Subject(s)
Applications of Mathematics

Specific Detail Info
This book is open access, which means that you have free and unlimited access Covers cutting-edge topics and compiled from the latest scientific research achievements in the past 20 years Uses probability distribution to carry out rigorous mathematical definitions and mathematical demonstrations This book fills the gap in the insufficient theoretical proofs of post-quantum cryptographic algorithms
Statement of Responsibility
Zhiyong Zheng , Kun Tian , Fengxia Liu
Other Information
Cataloger
-
Source
https://link.springer.com/book/10.1007/978-981-19-7644-5
Validator
ida
Digital Object Identifier (DOI)
https://doi.org/10.1007/978-981-19-7644-5
Journal Volume
-
Journal Issue
-
Subtitle
-
Parallel Title
-
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?