語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Multivariate public key cryptosystems
~
Ding, Jintai.
FindBook
Google Book
Amazon
博客來
Multivariate public key cryptosystems
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Multivariate public key cryptosystems/ by Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt.
作者:
Ding, Jintai.
其他作者:
Petzoldt, Albrecht.
出版者:
New York, NY :Springer US : : 2020.,
面頁冊數:
xxv, 253 p. :ill., digital ;24 cm.
內容註:
Introduction -- Multivariate Cryptography -- The Matsumoto-Imai Cryptosystem -- Hidden Field Equations -- Oil and Vinegar -- MQDSS -- The SimpleMatrix Encryption Scheme -- Solving Polynomial Systems.
Contained By:
Springer Nature eBook
標題:
Computers - Access control. -
電子資源:
https://doi.org/10.1007/978-1-0716-0987-3
ISBN:
9781071609873
Multivariate public key cryptosystems
Ding, Jintai.
Multivariate public key cryptosystems
[electronic resource] /by Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt. - Second edition. - New York, NY :Springer US :2020. - xxv, 253 p. :ill., digital ;24 cm. - Advances in information security,v.801568-2633 ;. - Advances in information security ;v.80..
Introduction -- Multivariate Cryptography -- The Matsumoto-Imai Cryptosystem -- Hidden Field Equations -- Oil and Vinegar -- MQDSS -- The SimpleMatrix Encryption Scheme -- Solving Polynomial Systems.
This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the book's website, interested readers can find source code to the algorithms handled in this book. In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs) The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems, but also for small devices with limited resources, which are used in ubiquitous computing. This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.
ISBN: 9781071609873
Standard No.: 10.1007/978-1-0716-0987-3doiSubjects--Topical Terms:
584008
Computers
--Access control.
LC Class. No.: QA76.9.A25 / D5635 2020
Dewey Class. No.: 005.82
Multivariate public key cryptosystems
LDR
:04283nmm a2200361 a 4500
001
2243555
003
DE-He213
005
20200930222312.0
006
m d
007
cr nn 008maaau
008
211207s2020 nyu s 0 eng d
020
$a
9781071609873
$q
(electronic bk.)
020
$a
9781071609859
$q
(paper)
024
7
$a
10.1007/978-1-0716-0987-3
$2
doi
035
$a
978-1-0716-0987-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D5635 2020
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
D584 2020
100
1
$a
Ding, Jintai.
$3
1621798
245
1 0
$a
Multivariate public key cryptosystems
$h
[electronic resource] /
$c
by Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt.
250
$a
Second edition.
260
$a
New York, NY :
$b
Springer US :
$b
Imprint: Springer,
$c
2020.
300
$a
xxv, 253 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
1568-2633 ;
$v
v.80
505
0
$a
Introduction -- Multivariate Cryptography -- The Matsumoto-Imai Cryptosystem -- Hidden Field Equations -- Oil and Vinegar -- MQDSS -- The SimpleMatrix Encryption Scheme -- Solving Polynomial Systems.
520
$a
This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the book's website, interested readers can find source code to the algorithms handled in this book. In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs) The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems, but also for small devices with limited resources, which are used in ubiquitous computing. This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.
650
0
$a
Computers
$x
Access control.
$3
584008
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Quantum Computing.
$3
1620399
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Symbolic and Algebraic Manipulation.
$3
891222
650
2 4
$a
Theory of Computation.
$3
892514
700
1
$a
Petzoldt, Albrecht.
$3
3503676
700
1
$a
Schmidt, Dieter S.
$3
3503677
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in information security ;
$v
v.80.
$3
3503678
856
4 0
$u
https://doi.org/10.1007/978-1-0716-0987-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9404601
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 D5635 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入