000 03116nam a22005295i 4500
001 978-0-387-36946-4
003 DE-He213
005 20250710083957.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 _a9780387369464
_a99780387369464
024 7 _a10.1007/978-0-387-36946-4
_2doi
082 0 4 _a005.74
_223
100 1 _aDing, Jintai.
_eauthor.
245 1 0 _aMultivariate Public Key Cryptosystems
_h[recurso electrónico] /
_cby Jintai Ding, Jason E. Gower, Dieter S. Schmidt.
264 1 _aBoston, MA :
_bSpringer US,
_c2006.
300 _aXVIII, 260 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v25
505 0 _aOverview -- Matsumoto-Imai Cryptosystems -- Oil-Vinegar Signature Schemes -- Hidden Field Equations -- Internal Perturbation -- Triangular Schemes -- Direct Attacks -- Future Research.
520 _aMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative. Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.
650 0 _aCOMPUTER SCIENCE.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aCODING THEORY.
650 0 _aINFORMATION THEORY.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aCODING AND INFORMATION THEORY.
650 2 4 _aDATA STRUCTURES.
650 2 4 _aMATHEMATICS OF COMPUTING.
650 2 4 _aTHEORY OF COMPUTATION.
700 1 _aGower, Jason E.
_eauthor.
700 1 _aSchmidt, Dieter S.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387322292
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v25
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-36946-4
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c57540
_d57540