Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1021
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTakagi, Tsuyoshi. ;en_US
dc.contributor.authorWakayama, Masato. ;en_US
dc.contributor.authorTanaka, Keisuke. ;en_US
dc.contributor.authorKunihiro, Noboru. ;en_US
dc.contributor.authorKimoto, Kazufumi. ;en_US
dc.contributor.authorDuong, Dung Hoang. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:29Z-
dc.date.available2020-05-17T08:24:29Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811050657 ;en_US
dc.identifier.isbn9789811050640 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1021-
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9789811050640. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts. ;en_US
dc.description.statementofresponsibilityedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong.en_US
dc.description.tableofcontents1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. . ;en_US
dc.format.extentVIII, 368 p. 23 illus., 6 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesMathematics for Industry, ; 2198-350X ; ; 29. ;en_US
dc.relation.ispartofseriesMathematics for Industry, ; 2198-350X ; ; 29. ;en_US
dc.relation.haspart9789811050640.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectNumber theory. ;en_US
dc.subjectQuantum field theory. ;en_US
dc.subjectString theory. ;en_US
dc.subjectQuantum physics. ;en_US
dc.subjectApplied mathematics. ;en_US
dc.subjectEngineering mathematics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectAppl.Mathematics/Computational Methods of Engineering. ;en_US
dc.subjectNumber Theory. ;en_US
dc.subjectQuantum Field Theories, String Theory. ;en_US
dc.subjectQuantum Physics. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleMathematical Modelling for Next-Generation Cryptographyen_US
dc.title.alternativeCREST Crypto-Math Project /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811050640.pdf6.66 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTakagi, Tsuyoshi. ;en_US
dc.contributor.authorWakayama, Masato. ;en_US
dc.contributor.authorTanaka, Keisuke. ;en_US
dc.contributor.authorKunihiro, Noboru. ;en_US
dc.contributor.authorKimoto, Kazufumi. ;en_US
dc.contributor.authorDuong, Dung Hoang. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:29Z-
dc.date.available2020-05-17T08:24:29Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811050657 ;en_US
dc.identifier.isbn9789811050640 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1021-
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9789811050640. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts. ;en_US
dc.description.statementofresponsibilityedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong.en_US
dc.description.tableofcontents1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. . ;en_US
dc.format.extentVIII, 368 p. 23 illus., 6 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesMathematics for Industry, ; 2198-350X ; ; 29. ;en_US
dc.relation.ispartofseriesMathematics for Industry, ; 2198-350X ; ; 29. ;en_US
dc.relation.haspart9789811050640.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectNumber theory. ;en_US
dc.subjectQuantum field theory. ;en_US
dc.subjectString theory. ;en_US
dc.subjectQuantum physics. ;en_US
dc.subjectApplied mathematics. ;en_US
dc.subjectEngineering mathematics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectAppl.Mathematics/Computational Methods of Engineering. ;en_US
dc.subjectNumber Theory. ;en_US
dc.subjectQuantum Field Theories, String Theory. ;en_US
dc.subjectQuantum Physics. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleMathematical Modelling for Next-Generation Cryptographyen_US
dc.title.alternativeCREST Crypto-Math Project /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811050640.pdf6.66 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTakagi, Tsuyoshi. ;en_US
dc.contributor.authorWakayama, Masato. ;en_US
dc.contributor.authorTanaka, Keisuke. ;en_US
dc.contributor.authorKunihiro, Noboru. ;en_US
dc.contributor.authorKimoto, Kazufumi. ;en_US
dc.contributor.authorDuong, Dung Hoang. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:29Z-
dc.date.available2020-05-17T08:24:29Z-
dc.date.issued2018en_US
dc.identifier.isbn9789811050657 ;en_US
dc.identifier.isbn9789811050640 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1021-
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9789811050640. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts. ;en_US
dc.description.statementofresponsibilityedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong.en_US
dc.description.tableofcontents1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. . ;en_US
dc.format.extentVIII, 368 p. 23 illus., 6 illus. in color. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesMathematics for Industry, ; 2198-350X ; ; 29. ;en_US
dc.relation.ispartofseriesMathematics for Industry, ; 2198-350X ; ; 29. ;en_US
dc.relation.haspart9789811050640.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectNumber theory. ;en_US
dc.subjectQuantum field theory. ;en_US
dc.subjectString theory. ;en_US
dc.subjectQuantum physics. ;en_US
dc.subjectApplied mathematics. ;en_US
dc.subjectEngineering mathematics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectAppl.Mathematics/Computational Methods of Engineering. ;en_US
dc.subjectNumber Theory. ;en_US
dc.subjectQuantum Field Theories, String Theory. ;en_US
dc.subjectQuantum Physics. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleMathematical Modelling for Next-Generation Cryptographyen_US
dc.title.alternativeCREST Crypto-Math Project /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811050640.pdf6.66 MBAdobe PDFThumbnail
Preview File