Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Attacks on Public-Key Cryptosystems

Buy

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

(HTML tags aren't allowed.)

Enterprise Architecture and New Generation Information Systems
Enterprise Architecture and New Generation Information Systems
Written for trained professionals in business, industry, government, and education, as well as for graduate students and researchers, this book approaches the subject of enterprise architecture and the best applications of current technology from many viewpoints. Producers, consumers, designers, and end users are considered, as is practical...
Getting Real: The smarter, faster, easier way to build a successful web application
Getting Real: The smarter, faster, easier way to build a successful web application

Getting Real details the business, design, programming, and marketing principles of 37signals. The book is packed with keep-it-simple insights, contrarian points of view, and unconventional approaches to software design. This is not a technical book or a design tutorial, it's a book of ideas. Anyone working on a web app -- including...

IQ: A Smart History of a Failed Idea
IQ: A Smart History of a Failed Idea

Advance praise for

IQ A Smart History of a Failed Idea

"An up-to-date, reader-friendly account of the continuing saga of the mismeasure of women and men."
—Howard Gardner, author of Frames of Mind and Multiple Intelligences: New Horizons

"The good news is that you won't be...


PMP Certification, A Beginner's Guide (Certification Press)
PMP Certification, A Beginner's Guide (Certification Press)

Essential Project Management Skills--Made Easy!

This accessible guide bridges the gap between being a project manager and becoming a globally recognized Project Management Professional (PMP). Covering the latest PMP exam content from the Project Management Institute (PMI), the book explains PMI's worldwide standard...

The Architecture Of Open Source Applications
The Architecture Of Open Source Applications
Carpentry is an exacting craft, and people can spend their entire lives learning how to do it well. But carpentry is not architecture: if we step back from pitch boards and miter joints, buildings as a whole must be designed, and doing that is as much an art as it is a craft or science.

Programming is also an exacting
...
The Mafia Encyclopedia
The Mafia Encyclopedia

Organized crime is the greatest criminal phenomenon of our time. From Al Capone, who boldly claimed his bootlegging activities were a public service, to John Gotti, the "Teflon don" who died in prison, these criminals have garnered headlines and captured the public imagination with their flamboyant lifestyles and colorful attitudes....

©2018 LearnIT (support@pdfchm.net) - Privacy Policy