000 04845nam a22007575i 4500
001 978-981-10-5065-7
003 DE-He213
005 20220801222113.0
007 cr nn 008mamaa
008 170725s2018 si | s |||| 0|eng d
020 _a9789811050657
_9978-981-10-5065-7
024 7 _a10.1007/978-981-10-5065-7
_2doi
050 4 _aQA76.9.D35
050 4 _aQ350-390
072 7 _aUMB
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM031000
_2bisacsh
072 7 _aUMB
_2thema
072 7 _aGPF
_2thema
082 0 4 _a005.73
_223
082 0 4 _a003.54
_223
245 1 0 _aMathematical Modelling for Next-Generation Cryptography
_h[electronic resource] :
_bCREST Crypto-Math Project /
_cedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong.
250 _a1st ed. 2018.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2018.
300 _aVIII, 368 p. 23 illus., 6 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aMathematics for Industry,
_x2198-3518 ;
_v29
505 0 _a1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. .
520 _aThis book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aData protection.
_97245
650 0 _aEngineering mathematics.
_93254
650 0 _aEngineering—Data processing.
_931556
650 0 _aNumber theory.
_913208
650 0 _aElementary particles (Physics).
_959722
650 0 _aQuantum field theory.
_912636
650 0 _aQuantum physics.
_959723
650 1 4 _aData Structures and Information Theory.
_931923
650 2 4 _aData and Information Security.
_931990
650 2 4 _aMathematical and Computational Engineering Applications.
_931559
650 2 4 _aNumber Theory.
_913208
650 2 4 _aElementary Particles, Quantum Field Theory.
_959724
650 2 4 _aQuantum Physics.
_959725
700 1 _aTakagi, Tsuyoshi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_959726
700 1 _aWakayama, Masato.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_959727
700 1 _aTanaka, Keisuke.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_959728
700 1 _aKunihiro, Noboru.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_959729
700 1 _aKimoto, Kazufumi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_959730
700 1 _aDuong, Dung Hoang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_959731
710 2 _aSpringerLink (Online service)
_959732
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811050640
776 0 8 _iPrinted edition:
_z9789811050664
776 0 8 _iPrinted edition:
_z9789811353093
830 0 _aMathematics for Industry,
_x2198-3518 ;
_v29
_959733
856 4 0 _uhttps://doi.org/10.1007/978-981-10-5065-7
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80401
_d80401