Modern cryptography. Volume 2, A classical introduction to informational and mathematical principle / Zhiyong Zheng, Kun Tian, Fengxia Liu.
2023
QA268
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Open access
Document Delivery Supplied
Open access
Details
Title
Modern cryptography. Volume 2, A classical introduction to informational and mathematical principle / Zhiyong Zheng, Kun Tian, Fengxia Liu.
Author
ISBN
9789811976445 (electronic bk.)
9811976449 (electronic bk.)
9789811976438
9811976449 (electronic bk.)
9789811976438
Published
Singapore : Springer, [2023]
Copyright
©2023
Language
English
Description
1 online resource (xi, 191 pages) : illustrations.
Item Number
10.1007/978-981-19-7644-5 doi
Call Number
QA268
Dewey Decimal Classification
652/.8
Summary
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
Bibliography, etc. Note
Includes bibliographical references.
Access Note
Open access
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed December 30, 2022).
Added Author
Series
Financial mathematics and fintech. 2662-7175
Linked Resources
Record Appears in
Table of Contents
Chapter 1. Gauss lattice theory
Chapter 2. Reduction principle of Ajtai
Chapter 3. Learning with errors
Chapter 4. LWE cryptosystem
Chapter 5. Cyclic lattice and Ideal lattice
Chapter 6. Fully Homomorphic Encryption
Chapter 7. General NTRU cryptosystem.
Chapter 2. Reduction principle of Ajtai
Chapter 3. Learning with errors
Chapter 4. LWE cryptosystem
Chapter 5. Cyclic lattice and Ideal lattice
Chapter 6. Fully Homomorphic Encryption
Chapter 7. General NTRU cryptosystem.