語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
International symposium on mathemati...
~
(1998 :)
International symposium on mathematics, quantum theory, and cryptographyProceedings of MQC 2019 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
International symposium on mathematics, quantum theory, and cryptographyedited by Tsuyoshi Takagi ... [et al.].
其他題名:
Proceedings of MQC 2019 /
其他題名:
MQC 2019
其他作者:
Takagi, Tsuyoshi.
團體作者:
出版者:
Singapore :Springer Singapore :2021.
面頁冊數:
xii, 274 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Cryptography.
電子資源:
https://doi.org/10.1007/978-981-15-5191-8
ISBN:
9789811551918$q(electronic bk.)
International symposium on mathematics, quantum theory, and cryptographyProceedings of MQC 2019 /
International symposium on mathematics, quantum theory, and cryptography
Proceedings of MQC 2019 /[electronic resource] :MQC 2019edited by Tsuyoshi Takagi ... [et al.]. - Singapore :Springer Singapore :2021. - xii, 274 p. :ill., digital ;24 cm. - Mathematics for industry,v.332198-350X ;. - Mathematics for industry ;v.4..
Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
Open access.
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
ISBN: 9789811551918$q(electronic bk.)
Standard No.: 10.1007/978-981-15-5191-8doiSubjects--Topical Terms:
189522
Cryptography.
LC Class. No.: QA268 / .I58 2019
Dewey Class. No.: 003.54
International symposium on mathematics, quantum theory, and cryptographyProceedings of MQC 2019 /
LDR
:03137nmm a2200361 a 4500
001
595547
003
DE-He213
005
20201022201941.0
006
m d
007
cr nn 008maaau
008
211005s2021 si s 0 eng d
020
$a
9789811551918$q(electronic bk.)
020
$a
9789811551901$q(paper)
024
7
$a
10.1007/978-981-15-5191-8
$2
doi
035
$a
978-981-15-5191-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA268
$b
.I58 2019
072
7
$a
TBJ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
TBJ
$2
thema
082
0 4
$a
003.54
$2
23
090
$a
QA268
$b
.I61 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
International symposium on mathematics, quantum theory, and cryptography
$h
[electronic resource] :
$b
Proceedings of MQC 2019 /
$c
edited by Tsuyoshi Takagi ... [et al.].
246
3
$a
MQC 2019
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 274 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Mathematics for industry,
$x
2198-350X ;
$v
v.33
505
0
$a
Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
506
$a
Open access.
520
$a
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
650
0
$a
Cryptography.
$3
189522
650
0
$a
Quantum computing.
$3
725269
650
0
$a
Quantum theory.
$3
199020
650
0
$a
Number theory.
$3
189521
650
1 4
$a
Mathematical and Computational Engineering.
$3
775095
650
2 4
$a
Data Structures and Information Theory.
$3
825714
650
2 4
$a
Quantum Computing.
$3
573152
650
2 4
$a
Systems and Data Security.
$3
274481
700
1
$a
Takagi, Tsuyoshi.
$3
379602
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Mathematics for industry ;
$v
v.4.
$3
681537
856
4 0
$u
https://doi.org/10.1007/978-981-15-5191-8
950
$a
Mathematics and Statistics (SpringerNature-11649)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000193810
電子館藏
1圖書
電子書
EB QA268 .I61 2019 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-15-5191-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入