Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multivariate Public Key Cryptosystems (Advances in Information Security)

Buy

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative.

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.

In the last ten years, multivariate public key cryptosystems, or MPKCs for short, have increasingly been seen by some as a possible alternative to the public key cryptosystem RSA, which is widely in use today. The security of RSA depends on the difficulty of factoring large integers on a conventional computer. Shor's polynomial-time integer factorization algorithm for a quantum computer means that eventually such alternatives will be necessary, provided that we can build a quantum computer with enough quantum bits.

A result from complexity theory states that solving a set of randomly chosen nonlinear polynomial equations over a finite field is NP-hard. So far quantum computers have not yet been shown to be able to solve a set of multivariate polynomial equations efficiently, and the consensus is that quantum computers are unlikely to provide an advantage for this type of problem. Moreover, MPKC schemes are in general much more computationally efficient than number theoretic-based schemes. This has led to many new cryptographic schemes and constructions such as the Matsumoto-Imai cryptosystem (C* or MI), the Hidden Field Equations cryptosystem (HFE), the Oil-Vinegar signature scheme, the Tamed Transformation Method cryptosystem (TTM), and cryptosystems derived from internal perturbation. Some of these schemes seem to be very suitable for use in the ubiquitous computing devices with limited computing capacity, such as smart cards, wireless sensor networks, and active RFID tags. Indeed, Flash, also known as Sflash^^, a multivariate signature scheme, was recently accepted as a security standard for use in low-cost smart cards by the New European Schemes for Signatures, Integrity and Encryption (NESSIE): IST-1999-12324.

(HTML tags aren't allowed.)

Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier

The Internet is like the Old West a frontier rich with opportunity and hope, but also a rough-and-tumble land of questionable characters, dubious legal jurisdictions, and hidden dangers. And just like the Old West, if you want to stake out your territory, you have to get there first and fend for yourself. On the web, that means defending your...

XSLT, 2nd Edition
XSLT, 2nd Edition
The goal of this book is to help you make the most of XSLT, the Extensible Stylesheet Language for Transformations. It covers both XSLT 1.0 and XSLT 2.0, along with versions 1.0 and 2.0 of XPath, the XML Path Language. The two languages are designed to work together: XPath identifies the parts of an XML document that should be transformed, and XSLT...
The Integrated Architecture Framework Explained: Why, What, How
The Integrated Architecture Framework Explained: Why, What, How

This book captures and communicates the wealth of architecture experience Capgemini has gathered as a member of The Open Group – a vendor- and technology-neutral consortium formed by major industry players – in developing, deploying, and using its “Integrated Architecture Framework” (IAF) since its origination in 1993....


Understanding Microelectronics: A Top-Down Approach
Understanding Microelectronics: A Top-Down Approach

The microelectronics evolution has given rise to many modern benefits but has also changed design methods and attitudes to learning. Technology advancements shifted focus from simple circuits to complex systems with major attention to high-level descriptions. The design methods moved from a bottom-up to a top-down approach.

For...

The Transform and Data Compression Handbook (Electrical Engineering and Signal Processing Series)
The Transform and Data Compression Handbook (Electrical Engineering and Signal Processing Series)

Transforms and Data Compression Handbook presents issues that are fundamental to communications, image processing, image and data storage, and the medical field. By illustrating the link between the transformation of data and efficient compression, using the basic theory of transforms and real compression applications, the editors create a...

Surface and Interfacial Organometallic Chemistry and Catalysis
Surface and Interfacial Organometallic Chemistry and Catalysis
Heterogeneous catalysis has been essential to the development of efficient chemical processes for more than a century, and this field has been traditionally part of the solid state chemistry and surface science communities. The design of better catalysts has raised the following questions: "what is the structure of the active sites?" and...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy