International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019
dc.contributor.editor | Takagi, Tsuyoshi | |
dc.contributor.editor | Wakayama, Masato | |
dc.contributor.editor | Tanaka, Keisuke | |
dc.contributor.editor | Kunihiro, Noboru | |
dc.contributor.editor | Kimoto, Kazufumi | |
dc.contributor.editor | Ikematsu, Yasuhiko | |
dc.date.accessioned | 2020-11-13T13:35:48Z | |
dc.date.available | 2020-11-13T13:35:48Z | |
dc.date.issued | 2021 | |
dc.identifier | ONIX_20201113_9789811551918_36 | |
dc.identifier.uri | https://library.oapen.org/handle/20.500.12657/42930 | |
dc.description.abstract | This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography. | |
dc.language | English | |
dc.relation.ispartofseries | Mathematics for Industry | |
dc.subject.classification | thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBJ Maths for engineers | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security | en_US |
dc.subject.other | Mathematical and Computational Engineering | |
dc.subject.other | Data Structures and Information Theory | |
dc.subject.other | Quantum Computing | |
dc.subject.other | Systems and Data Security | |
dc.subject.other | Mathematical and Computational Engineering Applications | |
dc.subject.other | Data and Information Security | |
dc.subject.other | Cryptography for Quantum Computers | |
dc.subject.other | Post-quantum Cryptography | |
dc.subject.other | Number Theory | |
dc.subject.other | Representation Theory | |
dc.subject.other | Quantum Physics | |
dc.subject.other | Security Modelling | |
dc.subject.other | Open Access | |
dc.subject.other | Maths for engineers | |
dc.subject.other | Algorithms & data structures | |
dc.subject.other | Information theory | |
dc.subject.other | Mathematical theory of computation | |
dc.subject.other | Computer security | |
dc.subject.other | Network security | |
dc.title | International Symposium on Mathematics, Quantum Theory, and Cryptography | |
dc.title.alternative | Proceedings of MQC 2019 | |
dc.type | book | |
oapen.identifier.doi | 10.1007/978-981-15-5191-8 | |
oapen.relation.isPublishedBy | 6c6992af-b843-4f46-859c-f6e9998e40d5 | |
oapen.imprint | Springer Singapore | |
oapen.series.number | 33 | |
oapen.pages | 274 |