Multivariate Public Key Cryptosystems
Seiten
2010
|
Softcover reprint of hardcover 1st ed. 2006
Springer-Verlag New York Inc.
9781441940773 (ISBN)
Springer-Verlag New York Inc.
9781441940773 (ISBN)
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative.
Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.
Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.
Overview.- Matsumoto-Imai Cryptosystems.- Oil-Vinegar Signature Schemes.- Hidden Field Equations.- Internal Perturbation.- Triangular Schemes.- Direct Attacks.- Future Research.
| Erscheint lt. Verlag | 23.11.2010 |
|---|---|
| Reihe/Serie | Advances in Information Security ; 25 |
| Zusatzinfo | XVIII, 260 p. |
| Verlagsort | New York, NY |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Theorie / Studium ► Algorithmen |
| Informatik ► Theorie / Studium ► Kryptologie | |
| ISBN-13 | 9781441940773 / 9781441940773 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Buch | Softcover (2025)
Lehmanns Media (Verlag)
CHF 62,95
die Welt der generativen KI verstehen
Buch | Hardcover (2025)
Hanser (Verlag)
CHF 48,95
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media
Buch | Softcover (2021)
Springer (Verlag)
CHF 46,15