The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor, Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer, SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential: code-based, hash-based, lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de?ne the state of the art. In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008, washeldattheUniversityofCincinnati, USA, inOctober2008."
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
EUR 105 expédition depuis Allemagne vers Etats-Unis
Destinations, frais et délaisGratuit expédition vers Etats-Unis
Destinations, frais et délaisVendeur : Grand Eagle Retail, Mason, OH, Etats-Unis
Paperback. Etat : new. Paperback. The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor's algorithm (Peter W. Shor, "Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer",SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential:code-based,hash-based,lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de?ne the state of the art.In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008,washeldattheUniversityofCincinnati,USA, inOctober2008. Constitutes the refereed proceedings of the Third International Workshop on Post-Quantum Cryptography, PQCrypto 2010, held in Darmstadt, Germany, in May 2010. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9783642129285
Quantité disponible : 1 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 241 pages. 9.29x6.14x0.55 inches. In Stock. N° de réf. du vendeur x-3642129285
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Kartoniert / Broschiert. Etat : New. Cryptanalysis of Multivariate Systems.- Properties of the Discrete Differential with Cryptographic Applications.- Growth of the Ideal Generated by a Quadratic Boolean Function.- Mutant Zhuang-Zi Algorithm.- Cryptanalysis of Two Quartic Encryption Schemes an. N° de réf. du vendeur 5050023
Quantité disponible : 3 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Neuware - The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor, Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer ,SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential:code-based,hash-based,lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de ne the state of the art. In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008,washeldattheUniversityofCincinnati,USA, inOctober2008. N° de réf. du vendeur 9783642129285
Quantité disponible : 1 disponible(s)
Vendeur : Buchpark, Trebbin, Allemagne
Etat : Gut. Zustand: Gut | Sprache: Englisch | Produktart: Bücher. N° de réf. du vendeur 7493150/133
Quantité disponible : 1 disponible(s)
Vendeur : Buchpark, Trebbin, Allemagne
Etat : Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher. N° de réf. du vendeur 7493150/2
Quantité disponible : 1 disponible(s)