Afficher la notice abrégée

dc.contributor.editorTakagi, Tsuyoshi
dc.contributor.editorWakayama, Masato
dc.contributor.editorTanaka, Keisuke
dc.contributor.editorKunihiro, Noboru
dc.contributor.editorKimoto, Kazufumi
dc.contributor.editorIkematsu, Yasuhiko
dc.date.accessioned2021-02-17T08:48:53Z
dc.date.available2021-02-17T08:48:53Z
dc.date.issued2021
dc.date.submitted2021-02-15T10:21:15Z
dc.identifierONIX_20210215_9789811551918_34
dc.identifierOCN: 1202756336
dc.identifierhttps://library.oapen.org/handle/20.500.12657/46834
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/63693
dc.description.abstractThis open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
dc.languageEnglish
dc.relation.ispartofseriesMathematics for Industry
dc.rightsopen access
dc.subject.otherMathematical and Computational Engineering
dc.subject.otherData Structures and Information Theory
dc.subject.otherQuantum Computing
dc.subject.otherSystems and Data Security
dc.subject.otherMathematical and Computational Engineering Applications
dc.subject.otherData and Information Security
dc.subject.otherCryptography for Quantum Computers
dc.subject.otherPost-quantum Cryptography
dc.subject.otherNumber Theory
dc.subject.otherRepresentation Theory
dc.subject.otherQuantum Physics
dc.subject.otherSecurity Modelling
dc.subject.otherOpen Access
dc.subject.otherMaths for engineers
dc.subject.otherAlgorithms & data structures
dc.subject.otherInformation theory
dc.subject.otherMathematical theory of computation
dc.subject.otherComputer security
dc.subject.otherNetwork security
dc.subject.otherthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBJ Maths for engineers
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UR Computer security
dc.titleInternational Symposium on Mathematics, Quantum Theory, and Cryptography
dc.title.alternativeProceedings of MQC 2019
dc.typebook
oapen.identifier.doi10.1007/978-981-15-5191-8
oapen.relation.isPublishedBy9fa3421d-f917-4153-b9ab-fc337c396b5a
oapen.relation.isFundedByKyushu University
oapen.relation.isFundedBycf5c7e50-980c-43e1-a2db-048930adda68
oapen.imprintSpringer Singapore
oapen.pages274
oapen.grant.number[grantnumber unknown]
dc.relationisFundedBycf5c7e50-980c-43e1-a2db-048930adda68
dc.seriesnumber33


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée

open access
Excepté là où spécifié autrement, la license de ce document est décrite en tant que open access