Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
.
Default
.
PageMenu
-
Main Menu
-
Simple Search
.
Advanced Search
.
Journal Search
.
Refine Search Results
.
Preferences
.
Search Menu
Simple Search
.
Advanced Search
.
New Items Search
.
Journal Search
.
Refine Search Results
.
Bottom Menu
Help
Italian
.
English
.
German
.
New Item Menu
New Items Search
.
New Items List
.
Links
SISSA Library
.
ICTP library
.
Italian National web catalog (SBN)
.
Trieste University web catalog
.
Udine University web catalog
.
© LIBERO v6.4.1sp220816
Page content
You are here
:
Catalogue Display
Catalogue Display
Post-Quantum Cryptography
.
Bookmark this Record
Catalogue Record 27596
.
.
Author info on Wikipedia
.
.
LibraryThing
.
.
Google Books
.
.
Amazon Books
.
Catalogue Information
Catalogue Record 27596
.
Reviews
Catalogue Record 27596
.
British Library
Resolver for RSN-27596
Google Scholar
Resolver for RSN-27596
WorldCat
Resolver for RSN-27596
Catalogo Nazionale SBN
Resolver for RSN-27596
GoogleBooks
Resolver for RSN-27596
ICTP Library
Resolver for RSN-27596
.
Share Link
Jump to link
Catalogue Information
Field name
Details
Dewey Class
512.7
Title
Post-Quantum Cryptography ([Ebook]) / edited by Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen.
Author
Bernstein, Daniel J.
Added Personal Name
Buchmann, Johannes
Dahmen, Erik
Other name(s)
SpringerLink (Online service)
Publication
Berlin, Heidelberg : Springer , 2009.
Physical Details
: online resource.
ISBN
9783540887027
Summary Note
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included. This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.:
System details note
Online access to this digital book is restricted to subscription institutions through IP address (only for SISSA internal users).
Internet Site
http://dx.doi.org/10.1007/978-3-540-88702-7
Links to Related Works
Subject References:
Appl.Mathematics/Computational Methods of Engineering
.
Data Encryption
.
Data encryption (Computer science)
.
Engineering mathematics
.
Information theory
.
Mathematics
.
Mathematics of Computing
.
Number Theory
.
Theory of Computation
.
Authors:
Bernstein, Daniel J.
.
Buchmann, Johannes
.
Dahmen, Erik
.
editor
.
Corporate Authors:
SpringerLink (Online service)
.
Classification:
512.7
.
512.7 (DDC 22)
.
.
ISBD Display
Catalogue Record 27596
.
Tag Display
Catalogue Record 27596
.
Related Works
Catalogue Record 27596
.
Marc XML
Catalogue Record 27596
.
Add Title to Basket
Catalogue Record 27596
.
Catalogue Information 27596
Beginning of record
.
Catalogue Information 27596
Top of page
.
Download Title
Catalogue Record 27596
Export
This Record
As
Labelled Format
Bibliographic Format
ISBD Format
MARC Format
MARC Binary Format
MARCXML Format
User-Defined Format:
Title
Author
Series
Publication Details
Subject
To
File
Email
Reviews
This item has not been rated.
Add a Review and/or Rating
27596
1
27596
-
2
27596
-
3
27596
-
4
27596
-
5
27596
-
Quick Search
Search for