Fr. 69.00

Mathematical Foundations for Post-Quantum Cryptography - Crypto-Math CREST

Inglese · Copertina rigida

Pubblicazione il 13.05.2025

Descrizione

Ulteriori informazioni

This open access book presents mathematical foundations for cryptography securely used in the era of quantum computers.
In particular, this book aims to deepen the basic mathematics of post-quantum cryptography, model the strongest possible attacks such as side-channel attacks, and construct cryptographic protocols that guarantee security against such attacks.
This book is a sequel of the successful book entitled by ``Mathematical Modeling for Next-Generation Cryptography - CREST Crypto-Math Project'' which was published in 2018.
The book is suitable for use in an advanced graduate course in mathematical cryptography and as a reference book for experts.

Sommario

1. Algebraic Geometry.- 2. Number Theory.- 3. Theory of Computation.- 4. Quantum Computation.- 5. Quantum Field Theory.- 6. Mathematical Physics.- 7. Representation Theory.- 8. Lattice Theory.- 9. Multivariate Polynomial Theory.- 10. Data Encryption.- 11. Digital Signature.- 12. Searchable Encryption.- 13. Obfuscation.- 14. Privacy Protection.- 15. Copyright Protection.- 16. ID-based Encryption.

Info autore

Tsuyoshi Takagi is a professor in the Department of Mathematical Informatics at the University of Tokyo. His current research interests are information security and cryptography. He received the Ph.D. from the Technical University of Darmstadt in 2001. He received IEICE Achievement Award in 2013 and JSPS Prize in 2014. He was a program chair of the 7th International Conference on Post-Quantum Cryptography, PQCrypto 2016.
Masato Wakayama is the Fundamental Mathematics Research principal of NTT Institute for Fundamental Mathematics in Nippon Telegraph and Telephone Corporation. He also serves as a principal fellow at Center for Research and Development Strategy of Japan Science and Technology Agency and a professor emeritus at Institute of Mathematics for Industry of Kyushu University. His current research interests are representation theory and its applications to number theory and quantum physics. He received the Ph.D. from Hiroshima University in 1985. He received Nice-Step-Researcher Award in 2007 by Ministry of Education, Culture, Sports, Science, and Technology (MEXT). He also managed various research projects on mathematics for industry such as Global COE Program “Education and Research Hub for Mathematics-for-Industry” by MEXT.
 
Noboru Kunihiro is a professor in the Department of Faculty of Engineering, Information, and Systems at the University of Tsukuba. His current research interests are information security and cryptography. He received the Ph.D. from the University of Tokyo in 2001. He has served as program committees of many international conferences on information security, for example, a program chair of the 5th International Workshop on Security, IWSEC2010.
 
Keisuke Tanaka is a professor in School of Computing at Tokyo Institute of Technology. His current research interests are cryptography and computational complexity theory. He received the Ph.D. from Japan Advanced Institute of Science and Technology in 1997. He received IEICE Distinguished Educational Practitioners Award in 2020.
 
Kazufumi Kimoto is a professor in the Department of Mathematical Sciences at the University of the Ryukyus. His current research interests are representation theory and its applications to cryptography. He received the Ph.D. from Kyushu University in 2003. He received Inoue Research Award for Young Scientists in 2003.
 
Momonari Kudo is an assistant professor in the Faculty of Information Engineering at Fukuoka Institute of Technology. His current research interests are computational algebraic geometry and its applications to cryptography. He received the Ph.D. from Kyushu University in 2017. He received JSIAM Best Presentation Award in 2017 and JSSAC Research Award for Young Scientists in 2020.
 

Riassunto

This open access book presents mathematical foundations for cryptography securely used in the era of quantum computers.
In particular, this book aims to deepen the basic mathematics of post-quantum cryptography, model the strongest possible attacks such as side-channel attacks, and construct cryptographic protocols that guarantee security against such attacks.
This book is a sequel of the successful book entitled by ``Mathematical Modeling for Next-Generation Cryptography - CREST Crypto-Math Project'' which was published in 2018.
The book is suitable for use in an advanced graduate course in mathematical cryptography and as a reference book for experts.

Dettagli sul prodotto

Con la collaborazione di Kazufumi Kimoto (Editore), Momonari Kudo (Editore), Noboru Kunihiro (Editore), Noboru Kunihiro et al (Editore), Tsuyoshi Takagi (Editore), Keisuke Tanaka (Editore), Masato Wakayama (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Formato Copertina rigida
Pubblicazione 13.05.2025, ritardato
 
EAN 9789819612178
ISBN 978-981-9612-17-8
Pagine 480
Illustrazioni X, 480 p. 45 illus., 16 illus. in color.
Serie Mathematics for Industry
Categorie Scienze naturali, medicina, informatica, tecnica > Fisica, astronomia > Fisica teorica

Zahlentheorie, Open Access, Algebraische Geometrie, Theory of Computation, Algebraic Geometry, Number Theory, Mathematical physics, computational number theory, representation theory, Quantum Computation, post-quantum cryptography, Lattice Theory, Multivariate Polynomial Theory

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.