Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post Quantum Cryptography

Buy
Post Quantum Cryptography, 9783540887010 (3540887016), Springer, 2008
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.

About the Author

Daniel J. Bernstein is a research professor in the Department of Computer Science at the University of Illinois at Chicago. Professor Bernstein has received a U.S. National
Science Foundation CAREER award, a Cyber Trust award, three more U.S.government grants, and a Sloan Research Fellowship for his research in computational number theory, cryptography, and computer security. He is the author of several dozen papers and two of the Internet's most popular server software packages, djbdns and qmail.

Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technische Universität Darmstadt and an associate editor of the  Journal of Cryptology. He received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. He also received the Karl Heinz-Beckurts Award for  technology transfer. He is a member of the German Academy of Science and Engieneering.

Erik Dahmen is a PhD student in Prof. Buchmann's research group at the Technische Universität Darmstadt. He received his diploma degree in Mathematics from the Technische Universität Darmstadt in 2006. Erik Dahmen is the author of various research papers on hash-based cryptography.

(HTML tags aren't allowed.)

Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Pursuing an interdisciplinary approach, this book offers detailed insights into the empirical relationships between overall social key figures of states and cultures in the fields of information and communication technology (ICT) (digital divide/inequality), the economy, education and religion. Its goal is to bridge the ‘cultural...
C Programming for Scientists and Engineers (Manufacturing Engineering Series)
C Programming for Scientists and Engineers (Manufacturing Engineering Series)
The aim of this book is to provide a rapid introduction to the C programming language. In a computing world that is increasingly full of C++ and Object Oriented methods, C still has an important role to play, particularly in the implementation of engineering and scientific calculations. This book is biased towards those features of C that make it...
Agent and Multi-agent Technology for Internet and Enterprise Systems (Studies in Computational Intelligence)
Agent and Multi-agent Technology for Internet and Enterprise Systems (Studies in Computational Intelligence)

Research in multi-agent systems offers a promising technology for problems with networks, online trading and negotiations but also social structures and communication. This is a book on agent and multi-agent technology for internet and enterprise systems. The book is a pioneer in the combination of the fields and is based on the concept of...


Schaum's Outline of Organic Chemistry
Schaum's Outline of Organic Chemistry

Confusing Textbooks? Missed Lectures? Not Enough Time?

Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all...

JNCIA: Juniper Networks Certified Internet Associate Study Guide
JNCIA: Juniper Networks Certified Internet Associate Study Guide

Here’s the book you need to prepare for the JNCIA exam JNO-201 from Juniper Networks. Written by a team of Juniper Networks trainers and engineers, this Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of official test objectives
  • Hundreds of...
Small Animal Medical Differential Diagnosis: A Book of Lists, 2e
Small Animal Medical Differential Diagnosis: A Book of Lists, 2e

Small Animal Medical Differential Diagnosis, 2nd Edition is a practical, concise guide to the differential diagnosis, etiology, laboratory abnormalities, and classification of clinical signs and medical disorders in dogs and cats. By covering nearly every possible sign and clinical disorder relevant to small animal medical practice,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy