Show simple item record

dc.contributor.editorTakagi, Tsuyoshi
dc.contributor.editorWakayama, Masato
dc.contributor.editorTanaka, Keisuke
dc.contributor.editorKunihiro, Noboru
dc.contributor.editorKimoto, Kazufumi
dc.contributor.editorIkematsu, Yasuhiko
dc.date.accessioned2020-11-13T13:35:48Z
dc.date.available2020-11-13T13:35:48Z
dc.date.issued2021
dc.identifierONIX_20201113_9789811551918_36
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/42930
dc.description.abstractThis open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
dc.languageEnglish
dc.relation.ispartofseriesMathematics for Industry
dc.subject.classificationthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBJ Maths for engineersen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structuresen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computationen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.otherMathematical and Computational Engineering
dc.subject.otherData Structures and Information Theory
dc.subject.otherQuantum Computing
dc.subject.otherSystems and Data Security
dc.subject.otherMathematical and Computational Engineering Applications
dc.subject.otherData and Information Security
dc.subject.otherCryptography for Quantum Computers
dc.subject.otherPost-quantum Cryptography
dc.subject.otherNumber Theory
dc.subject.otherRepresentation Theory
dc.subject.otherQuantum Physics
dc.subject.otherSecurity Modelling
dc.subject.otherOpen Access
dc.subject.otherMaths for engineers
dc.subject.otherAlgorithms & data structures
dc.subject.otherInformation theory
dc.subject.otherMathematical theory of computation
dc.subject.otherComputer security
dc.subject.otherNetwork security
dc.titleInternational Symposium on Mathematics, Quantum Theory, and Cryptography
dc.title.alternativeProceedings of MQC 2019
dc.typebook
oapen.identifier.doi10.1007/978-981-15-5191-8
oapen.relation.isPublishedBy6c6992af-b843-4f46-859c-f6e9998e40d5
oapen.imprintSpringer Singapore
oapen.series.number33
oapen.pages274


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record