<p>This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It
Topics in Post-Quantum Cryptography: Lattice-Based Methods
β Scribed by Jesko HΓΌttenhain, Lars Wallenborn
- Year
- 2011
- Tongue
- English
- Leaves
- 23
- Series
- Lecture notes
- Edition
- version 18 Jan 2011
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It in
Quantum computers will break todays most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption sy
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption s