Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project /

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathe...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Takagi, Tsuyoshi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Wakayama, Masato (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Tanaka, Keisuke (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Kunihiro, Noboru (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Kimoto, Kazufumi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Duong, Dung Hoang (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Mathematics for Industry, 29
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04873nam a2200685 4500
001 978-981-10-5065-7
003 DE-He213
005 20191029054558.0
007 cr nn 008mamaa
008 170725s2018 si | s |||| 0|eng d
020 |a 9789811050657  |9 978-981-10-5065-7 
024 7 |a 10.1007/978-981-10-5065-7  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D35 
050 4 |a Q350-390 
072 7 |a UMB  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
082 0 4 |a 005.73  |2 23 
245 1 0 |a Mathematical Modelling for Next-Generation Cryptography  |h [electronic resource] :  |b CREST Crypto-Math Project /  |c edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong. 
250 |a 1st ed. 2018. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2018. 
300 |a VIII, 368 p. 23 illus., 6 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Mathematics for Industry,  |x 2198-350X ;  |v 29 
505 0 |a 1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. . 
520 |a This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts. 
650 0 |a Data structures (Computer science). 
650 0 |a Computer security. 
650 0 |a Applied mathematics. 
650 0 |a Engineering mathematics. 
650 0 |a Number theory. 
650 0 |a Quantum field theory. 
650 0 |a String theory. 
650 0 |a Quantum physics. 
650 1 4 |a Data Structures and Information Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/I15009 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Mathematical and Computational Engineering.  |0 http://scigraph.springernature.com/things/product-market-codes/T11006 
650 2 4 |a Number Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/M25001 
650 2 4 |a Quantum Field Theories, String Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/P19048 
650 2 4 |a Quantum Physics.  |0 http://scigraph.springernature.com/things/product-market-codes/P19080 
700 1 |a Takagi, Tsuyoshi.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wakayama, Masato.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Tanaka, Keisuke.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Kunihiro, Noboru.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Kimoto, Kazufumi.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Duong, Dung Hoang.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9789811050640 
776 0 8 |i Printed edition:  |z 9789811050664 
776 0 8 |i Printed edition:  |z 9789811353093 
830 0 |a Mathematics for Industry,  |x 2198-350X ;  |v 29 
856 4 0 |u https://doi.org/10.1007/978-981-10-5065-7  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)