Modern Cryptography Volume 2 A Classical Introduction to Informational and Mathematical Principle
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-qua...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Singapore
Springer Nature
2023
|
Series: | Financial Mathematics and Fintech
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_94984 | ||
005 | 20221214 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20221214s2023 xx |||||o ||| 0|eng d | ||
020 | |a 978-981-19-7644-5 | ||
020 | |a 9789811976445 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.1007/978-981-19-7644-5 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KCB |2 bicssc | |
072 | 7 | |a PBW |2 bicssc | |
100 | 1 | |a Zheng, Zhiyong |4 auth | |
700 | 1 | |a Tian, Kun |4 auth | |
700 | 1 | |a Liu, Fengxia |4 auth | |
245 | 1 | 0 | |a Modern Cryptography Volume 2 |b A Classical Introduction to Informational and Mathematical Principle |
260 | |a Singapore |b Springer Nature |c 2023 | ||
300 | |a 1 electronic resource (191 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Financial Mathematics and Fintech | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research. | ||
536 | |a Renmin University of China | ||
540 | |a Creative Commons |f by/4.0/ |2 cc |4 http://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Macroeconomics |2 bicssc | |
650 | 7 | |a Applied mathematics |2 bicssc | |
653 | |a Post-Quantum Cryptography | ||
653 | |a Gauss Lattice | ||
653 | |a Reduction | ||
653 | |a Learning With Errors | ||
653 | |a FHE | ||
653 | |a Fourier transform | ||
653 | |a Ideal lattice | ||
653 | |a NTRU | ||
653 | |a Smoothing parameters | ||
653 | |a Discrete Gaussian measure | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/20.500.12657/60195/1/978-981-19-7644-5.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/94984 |7 0 |z DOAB: description of the publication |