Implementation and Analysis of Ciphers in Quantum Computing [electronic resource] / by Anubhab Baksi, Kyungbae Jang.

Por: Baksi, Anubhab [author.]Colaborador(es): Jang, Kyungbae [author.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Computer Architecture and Design MethodologiesEditor: Singapore : Springer Nature Singapore : Imprint: Springer, 2024Edición: 1st ed. 2024Descripción: XIV, 151 p. 57 illus., 9 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789819700257Tema(s): Electronic circuits | Data protection | Quantum computers | Electronic Circuits and Systems | Data and Information Security | Quantum ComputingFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 621.3815 Clasificación LoC:TK7867-7867.5Recursos en línea: Libro electrónicoTexto
Contenidos:
Introduction: Emergence of Quantum Computing -- Quantum Computing Fundamental and Cryptographic Perspective -- Reversible S-box Implementation with LIGHTER-R -- Quantum Implementation and Resource Estimate for RECTANGLE and KNOT -- Quantum Implementation and Analysis of DEFAULT -- Quantum Analysis of AES -- Improved Quantum Analysis of SPECK and LOWMC -- Optimized Quantum Implementation and Analysis of CHAM -- Concise Cipher Description Conclusion and Outlook.
En: Springer Nature eBookResumen: This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an ever-growing need to analyze the ciphers that are being employed in ensuring security. The symmetric key ciphers are generally considered safe against quantum computers, though one must consider the possible impact due to Grover's search algorithm (that reduces the security claim to the square root bound of what is expected against a classical computer). This book consolidates all the major research works in one place and presents it with adequate clarity, making the subject matter easy to understand for seasoned researchers and students alike. It covers the prerequisite information, new research works (including some of the state of the art), thought-provoking problems for further research, and all the relevant source codes. This book is interesting to engineers, researchers, and students who work/study in the field of cryptography.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Introduction: Emergence of Quantum Computing -- Quantum Computing Fundamental and Cryptographic Perspective -- Reversible S-box Implementation with LIGHTER-R -- Quantum Implementation and Resource Estimate for RECTANGLE and KNOT -- Quantum Implementation and Analysis of DEFAULT -- Quantum Analysis of AES -- Improved Quantum Analysis of SPECK and LOWMC -- Optimized Quantum Implementation and Analysis of CHAM -- Concise Cipher Description Conclusion and Outlook.

This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an ever-growing need to analyze the ciphers that are being employed in ensuring security. The symmetric key ciphers are generally considered safe against quantum computers, though one must consider the possible impact due to Grover's search algorithm (that reduces the security claim to the square root bound of what is expected against a classical computer). This book consolidates all the major research works in one place and presents it with adequate clarity, making the subject matter easy to understand for seasoned researchers and students alike. It covers the prerequisite information, new research works (including some of the state of the art), thought-provoking problems for further research, and all the relevant source codes. This book is interesting to engineers, researchers, and students who work/study in the field of cryptography.

UABC ; Perpetuidad

Con tecnología Koha