001452599 000__ 03360cam\a2200517\i\4500 001452599 001__ 1452599 001452599 003__ OCoLC 001452599 005__ 20230314003309.0 001452599 006__ m\\\\\o\\d\\\\\\\\ 001452599 007__ cr\cn\nnnunnun 001452599 008__ 221230s2023\\\\si\a\\\\ob\\\\000\0\eng\d 001452599 020__ $$a9789811976445$$q(electronic bk.) 001452599 020__ $$a9811976449$$q(electronic bk.) 001452599 020__ $$z9789811976438 001452599 0247_ $$a10.1007/978-981-19-7644-5$$2doi 001452599 035__ $$aSP(OCoLC)1356507626 001452599 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP 001452599 049__ $$aISEA 001452599 050_4 $$aQA268 001452599 08204 $$a652/.8$$223/eng/20221230 001452599 1001_ $$aZheng, Zhiyong,$$eauthor. 001452599 24510 $$aModern cryptography.$$nVolume 2,$$pA classical introduction to informational and mathematical principle /$$cZhiyong Zheng, Kun Tian, Fengxia Liu. 001452599 24630 $$aClassical introduction to informational and mathematical principle 001452599 264_1 $$aSingapore :$$bSpringer,$$c[2023] 001452599 264_4 $$c©2023 001452599 300__ $$a1 online resource (xi, 191 pages) :$$billustrations. 001452599 336__ $$atext$$btxt$$2rdacontent 001452599 337__ $$acomputer$$bc$$2rdamedia 001452599 338__ $$aonline resource$$bcr$$2rdacarrier 001452599 4901_ $$aFinancial mathematics and fintech,$$x2662-7175 001452599 504__ $$aIncludes bibliographical references. 001452599 5050_ $$aChapter 1. Gauss lattice theory -- Chapter 2. Reduction principle of Ajtai -- Chapter 3. Learning with errors -- Chapter 4. LWE cryptosystem -- Chapter 5. Cyclic lattice and Ideal lattice -- Chapter 6. Fully Homomorphic Encryption -- Chapter 7. General NTRU cryptosystem. 001452599 5060_ $$aOpen access$$5GW5XE 001452599 520__ $$aThis open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research. 001452599 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 30, 2022). 001452599 650_0 $$aCryptography. 001452599 655_0 $$aElectronic books. 001452599 7001_ $$aTian, Kun,$$eauthor. 001452599 7001_ $$aLiu, Fengxia,$$eauthor. 001452599 830_0 $$aFinancial mathematics and fintech.$$x2662-7175 001452599 852__ $$bebk 001452599 85640 $$3Springer Nature$$uhttps://link.springer.com/10.1007/978-981-19-7644-5$$zOnline Access$$91397441.2 001452599 909CO $$ooai:library.usi.edu:1452599$$pGLOBAL_SET 001452599 980__ $$aBIB 001452599 980__ $$aEBOOK 001452599 982__ $$aEbook 001452599 983__ $$aOnline 001452599 994__ $$a92$$bISE