Modern Cryptography Volume 2 : : A Classical Introduction to Informational and Mathematical Principle.
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-qua...
Saved in:
Superior document: | Financial Mathematics and Fintech |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Singapore : : Springer,, 2023. ©2023. |
Year of Publication: | 2023 |
Edition: | 1st ed. |
Language: | English |
Series: | Financial mathematics and Fintech
|
Physical Description: | 1 electronic resource (191 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993573521204498 |
---|---|
ctrlnum |
(CKB)5590000001022473 (oapen)https://directory.doabooks.org/handle/20.500.12854/94984 (MiAaPQ)EBC7156553 (Au-PeEL)EBL7156553 (OCoLC)1356507626 (EXLCZ)995590000001022473 |
collection |
bib_alma |
record_format |
marc |
spelling |
Zheng, Zhiyong. Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. Modern Crytography Volume Two 1st ed. Singapore : Springer, 2023. ©2023. 1 electronic resource (191 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Financial Mathematics and Fintech This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research. English Renmin University of China Description based on publisher supplied metadata and other sources. Macroeconomics bicssc Applied mathematics bicssc Post-Quantum Cryptography Gauss Lattice Reduction Learning With Errors FHE Fourier transform Ideal lattice NTRU Smoothing parameters Discrete Gaussian measure 981-19-7643-0 981-19-7644-9 Tian, Kun. Liu, Fengxia. Financial mathematics and Fintech |
language |
English |
format |
eBook |
author |
Zheng, Zhiyong. |
spellingShingle |
Zheng, Zhiyong. Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. Financial Mathematics and Fintech |
author_facet |
Zheng, Zhiyong. Tian, Kun. Liu, Fengxia. |
author_variant |
z z zz |
author2 |
Tian, Kun. Liu, Fengxia. |
author2_variant |
k t kt f l fl |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_sort |
Zheng, Zhiyong. |
title |
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. |
title_sub |
A Classical Introduction to Informational and Mathematical Principle. |
title_full |
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. |
title_fullStr |
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. |
title_full_unstemmed |
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. |
title_auth |
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. |
title_alt |
Modern Crytography Volume Two |
title_new |
Modern Cryptography Volume 2 : |
title_sort |
modern cryptography volume 2 : a classical introduction to informational and mathematical principle. |
series |
Financial Mathematics and Fintech |
series2 |
Financial Mathematics and Fintech |
publisher |
Springer, |
publishDate |
2023 |
physical |
1 electronic resource (191 p.) |
edition |
1st ed. |
isbn |
981-19-7643-0 981-19-7644-9 |
callnumber-first |
H - Social Science |
callnumber-subject |
HG - Finance |
callnumber-label |
HG1-9999 |
callnumber-sort |
HG 11 49999 |
illustrated |
Not Illustrated |
oclc_num |
1356507626 |
work_keys_str_mv |
AT zhengzhiyong moderncryptographyvolume2aclassicalintroductiontoinformationalandmathematicalprinciple AT tiankun moderncryptographyvolume2aclassicalintroductiontoinformationalandmathematicalprinciple AT liufengxia moderncryptographyvolume2aclassicalintroductiontoinformationalandmathematicalprinciple AT zhengzhiyong moderncrytographyvolumetwo AT tiankun moderncrytographyvolumetwo AT liufengxia moderncrytographyvolumetwo |
status_str |
n |
ids_txt_mv |
(CKB)5590000001022473 (oapen)https://directory.doabooks.org/handle/20.500.12854/94984 (MiAaPQ)EBC7156553 (Au-PeEL)EBL7156553 (OCoLC)1356507626 (EXLCZ)995590000001022473 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Financial Mathematics and Fintech |
is_hierarchy_title |
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle. |
container_title |
Financial Mathematics and Fintech |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1796652572693495808 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01590nam a22003973i 4500</leader><controlfield tag="001">993573521204498</controlfield><controlfield tag="005">20230317084551.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#cnu|||uuuuu</controlfield><controlfield tag="008">230317s2023 xx o ||||0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5590000001022473</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/94984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7156553</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7156553</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1356507626</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995590000001022473</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HG1-9999</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zheng, Zhiyong.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modern Cryptography Volume 2 :</subfield><subfield code="b">A Classical Introduction to Informational and Mathematical Principle.</subfield></datafield><datafield tag="246" ind1="0" ind2="0"><subfield code="a">Modern Crytography Volume Two</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (191 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Financial Mathematics and Fintech</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="536" ind1=" " ind2=" "><subfield code="a">Renmin University of China</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Macroeconomics</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Applied mathematics</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Post-Quantum Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Gauss Lattice</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Reduction</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Learning With Errors</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">FHE</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fourier transform</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ideal lattice</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NTRU</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smoothing parameters</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Discrete Gaussian measure</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="z">981-19-7643-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="z">981-19-7644-9</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tian, Kun.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Fengxia.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Financial mathematics and Fintech</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-05-27 14:37:36 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-12-05 16:10:45 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5341795830004498&Force_direct=true</subfield><subfield code="Z">5341795830004498</subfield><subfield code="b">Available</subfield><subfield code="8">5341795830004498</subfield></datafield></record></collection> |