Show simple item record

dc.contributor.authorZheng, Zhiyong
dc.contributor.authorTian, Kun
dc.contributor.authorLiu, Fengxia
dc.date.accessioned2022-12-14T04:04:07Z
dc.date.available2022-12-14T04:04:07Z
dc.date.issued2023
dc.date.submitted2022-12-13T12:41:03Z
dc.identifierONIX_20221213_9789811976445_48
dc.identifierhttps://library.oapen.org/handle/20.500.12657/60195
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/94984
dc.description.abstractThis open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
dc.languageEnglish
dc.relation.ispartofseriesFinancial Mathematics and Fintech
dc.rightsopen access
dc.subject.otherPost-Quantum Cryptography
dc.subject.otherGauss Lattice
dc.subject.otherReduction
dc.subject.otherLearning With Errors
dc.subject.otherFHE
dc.subject.otherFourier transform
dc.subject.otherIdeal lattice
dc.subject.otherNTRU
dc.subject.otherSmoothing parameters
dc.subject.otherDiscrete Gaussian measure
dc.subject.otherthema EDItEUR::K Economics, Finance, Business and Management::KC Economics::KCB Macroeconomics
dc.subject.otherthema EDItEUR::P Mathematics and Science::PB Mathematics::PBW Applied mathematics
dc.titleModern Cryptography Volume 2
dc.title.alternativeA Classical Introduction to Informational and Mathematical Principle
dc.typebook
oapen.identifier.doi10.1007/978-981-19-7644-5
oapen.relation.isPublishedBy9fa3421d-f917-4153-b9ab-fc337c396b5a
oapen.relation.isFundedByRenmin University of China
oapen.relation.isFundedBye6574b1a-f99f-4ac4-8c3f-0aa4c3d0c4f6
oapen.relation.isbn9789811976445
oapen.imprintSpringer
oapen.pages191
oapen.place.publicationSingapore
oapen.grant.number[...]
dc.relationisFundedBye6574b1a-f99f-4ac4-8c3f-0aa4c3d0c4f6


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

open access
Except where otherwise noted, this item's license is described as open access