000 03636nam a22005535i 4500
001 978-981-19-7644-5
003 DE-He213
005 20240508082117.0
007 cr nn 008mamaa
008 221210s2023 si | s |||| 0|eng d
020 _a9789811976445
_9978-981-19-7644-5
024 7 _a10.1007/978-981-19-7644-5
_2doi
050 4 _aHG1-9999
072 7 _aKFF
_2bicssc
072 7 _aBUS027000
_2bisacsh
072 7 _aKFF
_2thema
082 0 4 _a332
_223
100 1 _aZheng, Zhiyong.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aModern Cryptography Volume 2
_h[electronic resource] :
_bA Classical Introduction to Informational and Mathematical Principle /
_cby Zhiyong Zheng, Kun Tian, Fengxia Liu.
250 _a1st ed. 2023.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2023.
300 _aXI, 191 p. 2 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aFinancial Mathematics and Fintech,
_x2662-7175
505 0 _aChapter 1. Gauss lattice theory -- Chapter 2. Reduction principle of Ajtai -- Chapter 3. Learning with errors -- Chapter 4. LWE cryptosystem -- Chapter 5. Cyclic lattice and Ideal lattice -- Chapter 6. Fully Homomorphic Encryption -- Chapter 7. General NTRU cryptosystem.
506 0 _aOpen Access
520 _aThis open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
650 0 _aFinance.
650 0 _aSocial sciences
_xMathematics.
650 1 4 _aFinancial Economics.
650 2 4 _aMathematics in Business, Economics and Finance.
700 1 _aTian, Kun.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aLiu, Fengxia.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811976438
776 0 8 _iPrinted edition:
_z9789811976452
776 0 8 _iPrinted edition:
_z9789811976469
830 0 _aFinancial Mathematics and Fintech,
_x2662-7175
856 4 0 _uhttps://doi.org/10.1007/978-981-19-7644-5
912 _aZDB-2-ECF
912 _aZDB-2-SXEF
912 _aZDB-2-SOB
999 _c37611
_d37611