000 | 02804nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-15-8427-5 | ||
003 | DE-He213 | ||
005 | 20240423125330.0 | ||
007 | cr nn 008mamaa | ||
008 | 201014s2020 si | s |||| 0|eng d | ||
020 |
_a9789811584275 _9978-981-15-8427-5 |
||
024 | 7 |
_a10.1007/978-981-15-8427-5 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
100 | 1 |
_aZhang, Jiang. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aLattice-Based Cryptosystems _h[electronic resource] : _bA Design Perspective / _cby Jiang Zhang, Zhenfeng Zhang. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXIII, 174 p. 301 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Lattices -- Public-key encryption -- Identity-based encryption -- Attribute-based encryption -- Key Exchanges -- Digital signatures. | |
520 | _aThis book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area. | ||
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aData protection. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 1 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aMathematical Applications in Computer Science. |
700 | 1 |
_aZhang, Zhenfeng. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811584268 |
776 | 0 | 8 |
_iPrinted edition: _z9789811584282 |
776 | 0 | 8 |
_iPrinted edition: _z9789811584299 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-15-8427-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c176790 _d176790 |