Record ID | marc_oapen/convert_oapen_20201117.mrc:34242463:3680 |
Source | marc_oapen |
Download Link | /show-records/marc_oapen/convert_oapen_20201117.mrc:34242463:3680?format=raw |
LEADER: 03680namaa2200673uu 450
001 https://library.oapen.org/handle/20.500.12657/42930
005 20201113
020 $a978-981-15-5191-8
024 7 $a10.1007/978-981-15-5191-8$cdoi
041 0 $aEnglish
042 $adc
072 7 $aTBJ$2bicssc
072 7 $aUMB$2bicssc
072 7 $aUYA$2bicssc
072 7 $aUR$2bicssc
100 1 $aTakagi, Tsuyoshi$4edt
700 1 $aWakayama, Masato$4edt
700 1 $aTanaka, Keisuke$4edt
700 1 $aKunihiro, Noboru$4edt
700 1 $aKimoto, Kazufumi$4edt
700 1 $aIkematsu, Yasuhiko$4edt
700 1 $aTakagi, Tsuyoshi$4oth
700 1 $aWakayama, Masato$4oth
700 1 $aTanaka, Keisuke$4oth
700 1 $aKunihiro, Noboru$4oth
700 1 $aKimoto, Kazufumi$4oth
700 1 $aIkematsu, Yasuhiko$4oth
245 10 $aInternational Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019
260 $bSpringer Nature$c2021
300 $a1 electronic resource (274 p.)
506 0 $aOpen Access$2star$fUnrestricted online access
520 $aThis open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
540 $aCreative Commons$fby/4.0/$2cc$4http://creativecommons.org/licenses/by/4.0/
546 $aEnglish
650 7 $aMaths for engineers$2bicssc
650 7 $aAlgorithms & data structures$2bicssc
650 7 $aMathematical theory of computation$2bicssc
650 7 $aComputer security$2bicssc
653 $aMathematical and Computational Engineering
653 $aData Structures and Information Theory
653 $aQuantum Computing
653 $aSystems and Data Security
653 $aMathematical and Computational Engineering Applications
653 $aData and Information Security
653 $aCryptography for Quantum Computers
653 $aPost-quantum Cryptography
653 $aNumber Theory
653 $aRepresentation Theory
653 $aQuantum Physics
653 $aSecurity Modelling
653 $aOpen Access
653 $aMaths for engineers
653 $aAlgorithms & data structures
653 $aInformation theory
653 $aMathematical theory of computation
653 $aComputer security
653 $aNetwork security
856 40 $awww.oapen.org$uhttps://library.oapen.org/bitstream/id/eea4e1ba-67da-4295-8ae0-01d269b47a98/2021_Book_InternationalSymposiumOnMathem.pdf$70$zOAPEN Library: download the publication
856 40 $awww.oapen.org$uhttps://library.oapen.org/handle/20.500.12657/42930$70$zOAPEN Library: description of the publication