Inicio > > Seguridad informática > Practical Post-Quantum Signatures
Practical Post-Quantum Signatures

Practical Post-Quantum Signatures

Kwangjo Kim

72,25 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2025
Materia
Seguridad informática
ISBN:
9783031812491
72,25 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

The current digital signature methods like RSA, DSA, and ECDSA are relatively simple to understand, and their signing and verification processes operate in comparable time frames. However, in the quantum computing era, cryptographic methods must be designed to withstand both classical and quantum attacks. This requires an in-depth understanding of advanced mathematical concepts like algebraic geometry, lattice theory, Gaussian sampling, and efficient polynomial computation techniques such as FFT and NTT, which are essential for lattice-based cryptosystems.The FALCON algorithm, chosen as a finalist in the NIST Post-Quantum Cryptography (PQC) standardization project, is a lattice-based, hash-and-sign digital signature scheme known for its efficiency and compactness compared to other quantum-resistant signatures like Dilithium and SPHINCS+. Following FALCON’s development, the SOLMAE algorithm was introduced in 2021, offering a simplified signing process within the same GPV framework and also implemented in Python for easier accessibility.This monograph provides a practical and educational introduction to post-quantum digital signatures, focusing on the FALCON and SOLMAE algorithms. The material aims to bridge the gap between theory and practice, offering hands-on knowledge of post-quantum cryptographic techniques. With a focus on clear, practical examples using Python, this book is a valuable resource for anyone looking to understand or implement quantum-secure digital signatures.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    75,87 €

  • The GPT-4 Crypto Revolution
    Zane Wilder
    Discover the power of AI in the crypto world, from Bitcoin’s disruptive emergence to GPT-4’s cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your crypto journey. AI Insights: Unravel market trends using GPT-4’s accurate predictions.Strategy Development: Forge robust strategies...
    Disponible

    20,26 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    294,49 €

Otros libros del autor

  • Information Security and Cryptology - ICISC 2001
    Kwangjo Kim
    Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6-7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into th...
    Disponible

    65,41 €

  • Public Key Cryptography
    Kwangjo Kim
    This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001.The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, rangi...
    Disponible

    83,77 €