𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Topics in Post-Quantum Cryptography: Lattice-Based Methods

✍ Scribed by Jesko Hüttenhain, Lars Wallenborn


Year
2011
Tongue
English
Leaves
23
Series
Lecture notes
Edition
version 18 Jan 2011
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Lattice-Based Public-Key Cryptography in
✍ Sujoy Sinha Roy, Ingrid Verbauwhede πŸ“‚ Library πŸ“… 2020 πŸ› Springer Singapore 🌐 English

<p>This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It

Lattice-Based Public-Key Cryptography in
✍ Sujoy Sinha Roy; Ingrid Verbauwhede πŸ“‚ Library πŸ“… 2019 πŸ› Springer Nature 🌐 English

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It in

Post-Quantum Cryptography
✍ Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen πŸ“‚ Library πŸ“… 2008 πŸ› Springer 🌐 English

Quantum computers will break todays most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption sy

Post-Quantum Cryptography
✍ Bernstein D.J., Buchmann J., Dahmen E. (eds.) πŸ“‚ Library πŸ“… 2008 πŸ› Springer 🌐 English

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption s