Quantum Attacks on Public-Key Cryptosystems (Record no. 43426)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03001nam a22005417a 4500 |
001 - CONTROL NUMBER | |
control field | sulb-eb0021334 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | BD-SySUS |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20160413122140.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130427s2013 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781441977229 |
-- | 978-1-4419-7722-9 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-1-4419-7722-9 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.D35 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UMB |
Source | bicssc |
Subject category code | URY |
Source | bicssc |
Subject category code | COM031000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.74 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Yan, Song Y. |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Quantum Attacks on Public-Key Cryptosystems |
Medium | [electronic resource] / |
Statement of responsibility, etc. | by Song Y. Yan. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Boston, MA : |
Name of producer, publisher, distributor, manufacturer | Springer US : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | VIII, 207 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Classic and Quantum Computation -- Quantum Attacks on IFP-Based Cryptosystems -- Quantum Attacks on DLP-Based Cryptosystems -- Quantum Attacks on ECDLP-Based Cryptosystems -- Quantum-Computing Resistant Cryptosystems. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
Topical term or geographic name as entry element | Computer communication systems. |
Topical term or geographic name as entry element | Data structures (Computer science). |
Topical term or geographic name as entry element | Data encryption (Computer science). |
Topical term or geographic name as entry element | Algorithms. |
Topical term or geographic name as entry element | Computer science |
General subdivision | Mathematics. |
Topical term or geographic name as entry element | Computer Science. |
Topical term or geographic name as entry element | Data Structures, Cryptology and Information Theory. |
Topical term or geographic name as entry element | Data Encryption. |
Topical term or geographic name as entry element | Algorithm Analysis and Problem Complexity. |
Topical term or geographic name as entry element | Mathematics of Computing. |
Topical term or geographic name as entry element | Symbolic and Algebraic Manipulation. |
Topical term or geographic name as entry element | Computer Communication Networks. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781441977212 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a> |
912 ## - | |
-- | ZDB-2-SCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type |
No items available.