Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
International symposium on mathemati...
~
(1998 :)
International symposium on mathematics, quantum theory, and cryptographyProceedings of MQC 2019 /
Record Type:
Electronic resources : Monograph/item
Title/Author:
International symposium on mathematics, quantum theory, and cryptographyedited by Tsuyoshi Takagi ... [et al.].
Reminder of title:
Proceedings of MQC 2019 /
remainder title:
MQC 2019
other author:
Takagi, Tsuyoshi.
corporate name:
Published:
Singapore :Springer Singapore :2021.
Description:
xii, 274 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Cryptography.
Online resource:
https://doi.org/10.1007/978-981-15-5191-8
ISBN:
9789811551918$q(electronic bk.)
International symposium on mathematics, quantum theory, and cryptographyProceedings of MQC 2019 /
International symposium on mathematics, quantum theory, and cryptography
Proceedings of MQC 2019 /[electronic resource] :MQC 2019edited by Tsuyoshi Takagi ... [et al.]. - Singapore :Springer Singapore :2021. - xii, 274 p. :ill., digital ;24 cm. - Mathematics for industry,v.332198-350X ;. - Mathematics for industry ;v.4..
Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
Open access.
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
ISBN: 9789811551918$q(electronic bk.)
Standard No.: 10.1007/978-981-15-5191-8doiSubjects--Topical Terms:
189522
Cryptography.
LC Class. No.: QA268 / .I58 2019
Dewey Class. No.: 003.54
International symposium on mathematics, quantum theory, and cryptographyProceedings of MQC 2019 /
LDR
:03137nmm a2200361 a 4500
001
595547
003
DE-He213
005
20201022201941.0
006
m d
007
cr nn 008maaau
008
211005s2021 si s 0 eng d
020
$a
9789811551918$q(electronic bk.)
020
$a
9789811551901$q(paper)
024
7
$a
10.1007/978-981-15-5191-8
$2
doi
035
$a
978-981-15-5191-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA268
$b
.I58 2019
072
7
$a
TBJ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
TBJ
$2
thema
082
0 4
$a
003.54
$2
23
090
$a
QA268
$b
.I61 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
International symposium on mathematics, quantum theory, and cryptography
$h
[electronic resource] :
$b
Proceedings of MQC 2019 /
$c
edited by Tsuyoshi Takagi ... [et al.].
246
3
$a
MQC 2019
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 274 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Mathematics for industry,
$x
2198-350X ;
$v
v.33
505
0
$a
Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
506
$a
Open access.
520
$a
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
650
0
$a
Cryptography.
$3
189522
650
0
$a
Quantum computing.
$3
725269
650
0
$a
Quantum theory.
$3
199020
650
0
$a
Number theory.
$3
189521
650
1 4
$a
Mathematical and Computational Engineering.
$3
775095
650
2 4
$a
Data Structures and Information Theory.
$3
825714
650
2 4
$a
Quantum Computing.
$3
573152
650
2 4
$a
Systems and Data Security.
$3
274481
700
1
$a
Takagi, Tsuyoshi.
$3
379602
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Mathematics for industry ;
$v
v.4.
$3
681537
856
4 0
$u
https://doi.org/10.1007/978-981-15-5191-8
950
$a
Mathematics and Statistics (SpringerNature-11649)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000193810
電子館藏
1圖書
電子書
EB QA268 .I61 2019 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-981-15-5191-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login