Quantum Attacks on Public-Key Cryptosystems
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on...
Main Author: | Yan, Song Y. (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US : Imprint: Springer,
2013.
|
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4419-7722-9 |
Similar Items
-
Internet infrastructure : networking, web services, and cloud computing /
by: Fox, Richard, 1964-, et al.
Published: (2018) -
The impact of service oriented architecture adoption on organizations /
by: Niknejad, Naghmeh,, et al.
Published: (2019) -
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /
by: Monnappa K A,
Published: (2018) -
Computer and communication engineering : first International Conference, ICCCE 2018, Guayaquil, Ecuador, October 25-27, 2018, proceedings /
Published: (2019)