Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Attacks on Public-Key Cryptosystems

Buy

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

(HTML tags aren't allowed.)

Enterprise Java for SAP
Enterprise Java for SAP

Java Primer for SAP is designed as an introduction to Enterprise Java for the SAP developer. After providing a general introduction to Java, author Austin Sincock explores how to open the typically closed SAP environment to the world of Java. Sincock explores communicating with a SAP environment through such Enterprise Java...

The Web Programmer's Desk Reference
The Web Programmer's Desk Reference

One of the challenges of web programming is remembering what you can do with what, and what works with everything else. Sure, you can create a button, but can you change its color and font to match the style of your site? And are you sure it will look the same on all browsers? With The Web Programmer's Desk Reference, you can find...

iPod & iTunes: Missing Manual, Second Edition
iPod & iTunes: Missing Manual, Second Edition
In this freshly updated edition, New York Times tech columnist J. D. Biersdorfer blows open the secret doors of this gleaming, chrome-and-white beauty. With humor and authority, she lays bare an astonishing collection of useful tips, tricks, and shortcuts, and covers all iPod models for both Mac and Windows,...

jQuery UI 1.10: The User Interface Library for jQuery
jQuery UI 1.10: The User Interface Library for jQuery

Modern web application user interface design requires rapid development and proven results. jQuery UI, a trusted suite of official plugins for the jQuery JavaScript library, gives you a solid platform on which you can build rich and engaging interfaces with maximum compatibility, stability, and minimum time and effort.

jQuery
...

Core Java 2, Volume 1: Fundamentals (5th Edition)
Core Java 2, Volume 1: Fundamentals (5th Edition)

Ask any experienced Java programmer, Core Java delivers the real-world guidance you need to accomplish even the most challenging tasks That's why it's been an international best seller for five straight years. Core Java 2, Volume 1-Fundamentals...

Data Clustering: Theory, Algorithms, and Applications (ASA-SIAM Series on Statistics and Applied Probability)
Data Clustering: Theory, Algorithms, and Applications (ASA-SIAM Series on Statistics and Applied Probability)
Cluster analysis is an unsupervised process that divides a set of objects into homogeneous groups. This book starts with basic information on cluster analysis, including the classification of data and the corresponding similarity measures, followed by the presentation of over 50 clustering algorithms in groups according to some specific baseline...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy