Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project (Mathematics for Industry Book 29) 🔍
Tsuyoshi Takagi,Masato Wakayama,Keisuke Tanaka,Noboru Kunihiro,Kazufumi Kimoto,Dung Hoang Duong (eds.) Springer Singapore : Imprint : Springer, Mathematics for Industry, Mathematics for industry 29, 1, 2018
英语 [en] · PDF · 6.8MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
描述
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts. Read more...
Abstract: This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts
备用文件名
lgli/K:\!genesis\0day\spr\10.1007%2F978-981-10-5065-7.pdf
备用文件名
lgrsnf/K:\!genesis\0day\spr\10.1007%2F978-981-10-5065-7.pdf
备用文件名
nexusstc/Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project/c478ee330b8bc3a0dcb5044a289130cc.pdf
备用文件名
scihub/10.1007/978-981-10-5065-7.pdf
备用文件名
zlib/Computers/Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong/Mathematical modelling for next-generation cryptography : Crest Crypto-math Project_3377187.pdf
备选标题
Mathematical Modelling For Next Generation Cryptography Crest Crypto Math Project
备选标题
417070_Print.indd
备选作者
Takagi, Tsuyoshi; Wakayama, Masato; Tanaka, Keisuke; Kunihiro, Noboru; Kimoto, Kazufumi; Duong, Dung Hoang
备选作者
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong
备选作者
Jinlong Xu; Joyce Zhang; Ken Kuang
备选作者
0009172
备用出版商
Springer Science + Business Media Singapore Pte Ltd
备用出版商
Springer Nature Singapore
备用版本
Mathematics for industry (Springer (Firm)), v. 29, Singapore, 2018
备用版本
Mathematics for Industry, 29, 1st ed. 2018, Singapore, 2018
备用版本
Mathematics for industry 29, 2017
备用版本
Springer Nature, Singapore, 2018
备用版本
Singapore, Singapore
备用版本
1st ed. 2018, 2017
备用版本
Aug 04, 2017
元数据中的注释
sm66655050
元数据中的注释
producers:
Acrobat Distiller 10.0.0 (Windows)
元数据中的注释
{"container_title":"Mathematics for Industry","edition":"1","isbns":["9789811050640","9789811050657","9811050643","9811050651"],"issns":["2198-350X","2198-3518"],"last_page":368,"publisher":"Springer","series":"Mathematics for industry 29"}
元数据中的注释
Source title: Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project (Mathematics for Industry (29))
备用描述
Front Matter ....Pages i-viii
Introduction to CREST Crypto-Math Project (Tsuyoshi Takagi)....Pages 1-14
Front Matter ....Pages 15-15
Multivariate Public Key Cryptosystems (Yasufumi Hashimoto)....Pages 17-42
Code-Based Zero-Knowledge Protocols and Their Applications (Kirill Morozov)....Pages 43-62
Hash Functions Based on Ramanujan Graphs (Hyungrok Jo)....Pages 63-79
Pairings on Hyperelliptic Curves with Considering Recent Progress on the NFS Algorithms (Masahiro Ishii)....Pages 81-96
Efficient Algorithms for Isogeny Sequences and Their Cryptographic Applications (Katsuyuki Takashima)....Pages 97-114
Front Matter ....Pages 115-115
Spectral Degeneracies in the Asymmetric Quantum Rabi Model (Cid Reyes-Bustos, Masato Wakayama)....Pages 117-137
Spectra of Group-Subgroup Pair Graphs (Kazufumi Kimoto)....Pages 139-157
Ramanujan Cayley Graphs of the Generalized Quaternion Groups and the Hardy–Littlewood Conjecture (Yoshinori Yamasaki)....Pages 159-175
Uniform Random Number Generation and Secret Key Agreement for General Sources by Using Sparse Matrices (Jun Muramatsu, Shigeki Miyake)....Pages 177-198
Mathematical Approach for Recovering Secret Key from Its Noisy Version (Noboru Kunihiro)....Pages 199-217
Front Matter ....Pages 219-219
Simple Analysis of Key Recovery Attack Against LWE (Masaya Yasuda)....Pages 221-238
A Mixed Integer Quadratic Formulation for the Shortest Vector Problem (Keiji Kimura, Hayato Waki)....Pages 239-255
On Analysis of Recovering Short Generator Problems via Upper and Lower Bounds of Dirichlet L-Functions: Part 1 (Shingo Sugiyama)....Pages 257-278
On Analysis of Recovering Short Generator Problems via Upper and Lower Bounds of Dirichlet L-functions: Part 2 (Shinya Okumura)....Pages 279-295
Recent Progress on Coppersmith’s Lattice-Based Method: A Survey (Yao Lu, Liqiang Peng, Noboru Kunihiro)....Pages 297-312
Front Matter ....Pages 313-313
How to Strengthen the Security of Signature Schemes in the Leakage Models: A Survey (Yuyu Wang, Keisuke Tanaka)....Pages 315-330
Constructions for the IND-CCA1 Secure Fully Homomorphic Encryption (Satoshi Yasuda, Fuyuki Kitagawa, Keisuke Tanaka)....Pages 331-347
A Survey on Identity-Based Encryption from Lattices (Goichiro Hanaoka, Shota Yamada)....Pages 349-365
Back Matter ....Pages 367-368
备用描述
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
Erscheinungsdatum: 04.08.2017
备用描述
"This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts"--Page 4 of cover
开源日期
2017-10-15
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。