找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Quantum Attacks on Public-Key Cryptosystems; Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp

[復(fù)制鏈接]
查看: 35710|回復(fù): 35
樓主
發(fā)表于 2025-3-21 19:18:35 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Quantum Attacks on Public-Key Cryptosystems
編輯Song Y. Yan
視頻videohttp://file.papertrans.cn/782/781046/781046.mp4
概述Discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystems.Covers many alternative post-quantum cryptosystems to replace the classic IFP, DLP and ECDLP based crypt
圖書封面Titlebook: Quantum Attacks on Public-Key Cryptosystems;  Song Y. Yan Book 2013 Springer Science+Business Media, LLC 2013 Computational Complexity.Comp
描述.The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists..Quantum Attacks on Public-Key Cryptosystems. presemts almost all?known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems..This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field..
出版日期Book 2013
關(guān)鍵詞Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
版次1
doihttps://doi.org/10.1007/978-1-4419-7722-9
isbn_softcover978-1-4899-9779-1
isbn_ebook978-1-4419-7722-9
copyrightSpringer Science+Business Media, LLC 2013
The information of publication is updating

書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)




書目名稱Quantum Attacks on Public-Key Cryptosystems影響因子(影響力)學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度




書目名稱Quantum Attacks on Public-Key Cryptosystems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次




書目名稱Quantum Attacks on Public-Key Cryptosystems被引頻次學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用




書目名稱Quantum Attacks on Public-Key Cryptosystems年度引用學(xué)科排名




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋




書目名稱Quantum Attacks on Public-Key Cryptosystems讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:32:11 | 只看該作者
Song Y. Yanlth care costs and increasing demands to accomplish more with less financial support. Treatment costs can be reduced and health improved by preventing the toxic effects of drugs. This first volume of our new series, Drug and Alcohol to reduce the use and Abuse Reviews, focuses on stategies abuse of
板凳
發(fā)表于 2025-3-22 02:38:23 | 只看該作者
Song Y. Yanecher, 1972; Brill and Lieberman, 1972; Sells, 1974). Neither the medical model, which is considered by some to exacerbate the problem (Cummings, 1979), nor traditional psychotherapy, which too narrowly embraces the diversity of problems associated with drug abuse (Hughes, 1977), have been reported
地板
發(fā)表于 2025-3-22 05:48:51 | 只看該作者
5#
發(fā)表于 2025-3-22 09:44:10 | 只看該作者
dership, appropriate patients, experienced investigators, a good dose of common sense, a vision of the future, and some luck to develop significant new products. Many companies may possess these attributes; however, how well companies can pull all these manifold, often disparate, and sometimes confl
6#
發(fā)表于 2025-3-22 16:56:43 | 只看該作者
Quantum Attacks on DLP-Based Cryptosystems,P-based cryptographic systems and protocols whose security depends on the infeasibility of the DLP problem. Finally, we shall discuss a quantum approach to attacking both the DLP problem and the DLP-based cryptography.
7#
發(fā)表于 2025-3-22 19:50:21 | 只看該作者
8#
發(fā)表于 2025-3-22 21:25:30 | 只看該作者
9#
發(fā)表于 2025-3-23 02:17:20 | 只看該作者
https://doi.org/10.1007/978-1-4419-7722-9Computational Complexity; Computational Infeasibility; Computational Number Theory; Cryptanalysis; Crypt
10#
發(fā)表于 2025-3-23 08:03:53 | 只看該作者
978-1-4899-9779-1Springer Science+Business Media, LLC 2013
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-5 05:55
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
姚安县| 武威市| 沙湾县| 广宁县| 年辖:市辖区| 资溪县| 化德县| 封开县| 阳泉市| 平阳县| 高台县| 环江| 明溪县| 栾城县| 剑川县| 南汇区| 昭通市| 日喀则市| 九龙县| 浙江省| 靖江市| 库车县| 曲阜市| 察哈| 卢湾区| 龙胜| 怀安县| 郑州市| 白沙| 莫力| 永和县| 建湖县| 宣恩县| 罗甸县| 穆棱市| 安达市| 沂水县| 临桂县| 库尔勒市| 松阳县| 胶南市|