Quantum Attacks on Public-Key Cryptosystems

Quantum Attacks on Public-Key Cryptosystems

English | PDF,EPUB (True) | 2013 | 214 Pages | ISBN : 144197721X | 6.29 MB

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.
Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Download:

http://longfiles.com/gj4jv9g4bthl/Quantum_Attacks_on_Public-Key_Cryptosystems.rar.html

[Fast Download] Quantum Attacks on Public-Key Cryptosystems


Ebooks related to "Quantum Attacks on Public-Key Cryptosystems" :
Design, Launch, and Scale IoT Services: A Practical Business Approach
Innovations in Infrastructure: Proceedings of ICIIF 2018
Applications of Artificial Intelligence Techniques in Engineering: SIGMA 2018, Volume 1
Proceedings of the 2nd International Conference on Data Engineering and Communication Technology: IC
Third International Congress on Information and Communication Technology: ICICT 2018, London
Mobile WiMAX Systems: Performance Analysis of Fractional Frequency Reuse
Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics
Low-Rank Approximation: Algorithms, Implementation, Applications, Second Edition
Applied Cryptography and Network Security
Qualitative Research in Technical Communication
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sitemap