Fundraising September 15, 2024 – October 1, 2024 About fundraising

Quantum Attacks on Public-Key Cryptosystems

  • Main
  • Quantum Attacks on Public-Key...

Quantum Attacks on Public-Key Cryptosystems

Song Y. Yan
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.
Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.
Year:
2013
Publisher:
Springer
Language:
english
Pages:
214
ISBN 10:
1441977228
ISBN 13:
9781441977229
File:
PDF, 3.50 MB
IPFS:
CID , CID Blake2b
english, 2013
Read Online
Conversion to is in progress
Conversion to is failed

Most frequently terms