Modern Cryptography Volume 2 : : A Classical Introduction to Informational and Mathematical Principle.

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-qua...

Full description

Saved in:
Bibliographic Details
Superior document:Financial Mathematics and Fintech
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer,, 2023.
©2023.
Year of Publication:2023
Edition:1st ed.
Language:English
Series:Financial mathematics and Fintech
Physical Description:1 electronic resource (191 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01590nam a22003973i 4500
001 993573521204498
005 20230317084551.0
006 m o d |
007 cr#cnu|||uuuuu
008 230317s2023 xx o ||||0 eng d
035 |a (CKB)5590000001022473 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/94984 
035 |a (MiAaPQ)EBC7156553 
035 |a (Au-PeEL)EBL7156553 
035 |a (OCoLC)1356507626 
035 |a (EXLCZ)995590000001022473 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
041 0 |a eng 
050 4 |a HG1-9999 
100 1 |a Zheng, Zhiyong. 
245 1 0 |a Modern Cryptography Volume 2 :  |b A Classical Introduction to Informational and Mathematical Principle. 
246 0 0 |a Modern Crytography Volume Two 
250 |a 1st ed. 
264 1 |a Singapore :  |b Springer,  |c 2023. 
264 4 |c ©2023. 
300 |a 1 electronic resource (191 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Financial Mathematics and Fintech 
520 |a This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research. 
546 |a English 
536 |a Renmin University of China 
588 |a Description based on publisher supplied metadata and other sources. 
650 7 |a Macroeconomics  |2 bicssc 
650 7 |a Applied mathematics  |2 bicssc 
653 |a Post-Quantum Cryptography 
653 |a Gauss Lattice 
653 |a Reduction 
653 |a Learning With Errors 
653 |a FHE 
653 |a Fourier transform 
653 |a Ideal lattice 
653 |a NTRU 
653 |a Smoothing parameters 
653 |a Discrete Gaussian measure 
776 0 8 |z 981-19-7643-0 
776 0 8 |z 981-19-7644-9 
700 1 |a Tian, Kun. 
700 1 |a Liu, Fengxia. 
830 0 |a Financial mathematics and Fintech 
906 |a BOOK 
ADM |b 2023-05-27 14:37:36 Europe/Vienna  |f system  |c marc21  |a 2022-12-05 16:10:45 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5341795830004498&Force_direct=true  |Z 5341795830004498  |b Available  |8 5341795830004498