“ Post - Quantum Cryptography ”
نویسندگان
چکیده
1 Summary of the review In this review I present the book " Post-Quantum Cryptography ". This volume gives a detailed, technical-level treatment of the post-quantum cryptography universe. 2 Summary of the book When (if?) quantum computers of a big enough size will be available, most of the current public-key cryptography primitives based on number theory will be vulnerable. The " next generation " of cryptographic algorithms is commonly grouped into what is called Post-Quantum Cryptography. This is mainly divided in four areas: hash-based cryptography, code-based cryptography, lattice-based cryptography and multivariate cryptography. In this book, the editors put together the leading experts in the four areas to present the state of the art in each of the four incarnations of this exciting new research area. The main part of the book is, as expected, formed by four chapters, one for each of the areas mentioned above. In addition, the book features an introduction section and a preliminary chapter on Quantum Computing.
منابع مشابه
Post-quantum cryptography - dealing with the fallout of physics success
Cryptography is essential for the security of Internet communication, cars, and implanted medical devices. However, many commonly used cryptosystems will be completely broken once big quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. Thi...
متن کاملThe Impact of Quantum Computing on Present Cryptography
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s ...
متن کاملRefinement of the Four-Dimensional GLV Method on Elliptic Curves
All sessions will take place in room DMS 1110 in the Desmarais Building Monday, August 14, 2017 08:30 – 09:10 Registration (in the main floor lobby of the Desmarais Building) 09:10 – 09:15 Opening Remarks Full-day session: Introduction to Post-Quantum Cryptography Michele Mosca, Douglas Stebila, David Jao 09:15 10:30 Post-Quantum Cryptography Session 1 10:30 11:00 Coffee/Nutrition Break 11:00 1...
متن کاملQuantum and Post Quantum Cryptography
Public key cryptography is widely used for signing contracts, electronic voting, encryption, and to secure transactions over the Internet. The discovery by Peter Shor, in 1994, of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms undermined the security assumptions upon which currently used public key cryptographic algorithms are ba...
متن کاملFast Quantum Algorithm for Solving Multivariate Quadratic Equations
In August 2015 the cryptographic world was shaken by a sudden and surprising announcement by the US National Security Agency (NSA) concerning plans to transition to post-quantum algorithms. Since this announcement post-quantum cryptography has become a topic of primary interest for several standardization bodies. The transition from the currently deployed public-key algorithms to post-quantum a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015