Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Multivariate Public Key Cryptosystems

Best Price (Coupon Required):
Buy Multivariate Public Key Cryptosystems for $125.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $139.00 - $139.00
BEST PRICE

Single Product Purchase

$125.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$139.00 $139.00

10% OFF
This deals requires coupon
$125.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781071609873
Condition
New
Product Description

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the books website, interested readers can find source code to the algorithms handled in this book. In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs). The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems,but also for small devices with limited resources, which are used in ubiquitous computing. This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

ASIC Design and Synthesis

ASIC Design and Synthesis

$199.99
Cerebral Cavernous Malformations (CCM)

Cerebral Cavernous Malformations (CCM)

$199.99
Handbook of Clinical Geropsychology

Handbook of Clinical Geropsychology

$249.00
Social Media fr Fhrungskrfte

Social Media fr Fhrungskrfte

$59.99
Computer Tomographic Imaging and Anatomic Correlation of the Human Brain

Computer Tomographic Imaging and Anatomic Correlation of the Human Brain

$74.99
Bounded Rationality in Decision Making Under Uncertainty: Towards Optimal Granularity

Bounded Rationality in Decision Making Under Uncertainty: Towards Optimal Granularity

$109.99
Politische Kommunikation in der demokratischen Gesellschaft

Politische Kommunikation in der demokratischen Gesellschaft

$109.00
Transportversicherung

Transportversicherung

$99.99
Lungen- und Rippenfellentzndung

Lungen- und Rippenfellentzndung

$59.99
Fertility Decline and Background Independence

Fertility Decline and Background Independence

$54.99
The Abe Doctrine

The Abe Doctrine

$179.99
The Way to Rio Luna

The Way to Rio Luna

$7.49
Fragments of Union

Fragments of Union

$109.99
Knowledge and Systems Sciences

Knowledge and Systems Sciences

$79.99
Medizinstudium - Ius Practicandi - was nun?

Medizinstudium - Ius Practicandi - was nun?

$39.95
Grand Challenge Problems in Technology-Enhanced Learning II: MOOCs and Beyond

Grand Challenge Problems in Technology-Enhanced Learning II: MOOCs and Beyond

$54.99
Internationaler Motorenkongress 2014

Internationaler Motorenkongress 2014

$299.99
konomik und Wirtschaft

konomik und Wirtschaft

$39.99
Beschaffungsverhalten von Privatpersonen und Unternehmen

Beschaffungsverhalten von Privatpersonen und Unternehmen

$84.99
Radiation Therapy Physics

Radiation Therapy Physics

$109.99
Please, Mr. Panda/Por favor, Sr. Panda

Please, Mr. Panda/Por favor, Sr. Panda

$5.24
Abfallwirtschaft Theorie und Praxis

Abfallwirtschaft Theorie und Praxis

$59.99
EQ-5D Value Sets: Inventory, Comparative Review and User Guide

EQ-5D Value Sets: Inventory, Comparative Review and User Guide

$109.99
Grundumsatz und Psyche

Grundumsatz und Psyche

$59.99
Liability for Crimes Involving Artificial Intelligence Systems

Liability for Crimes Involving Artificial Intelligence Systems

$139.99
Lichtmodulation wechselstromgeheiter Glhlampen im Tonfrequenbereich

Lichtmodulation wechselstromgeheiter Glhlampen im Tonfrequenbereich

$54.99
Mathematical Principles in Bioinformatics

Mathematical Principles in Bioinformatics

$79.99
Performance Evaluation and Benchmarking for the Era of Cloud(s)

Performance Evaluation and Benchmarking for the Era of Cloud(s)

$54.99
Organisationsmethode

Organisationsmethode

$59.99
Technikhandhabung im hheren Alter

Technikhandhabung im hheren Alter

$49.99
Successful Prevention and Youth Development Programs

Successful Prevention and Youth Development Programs

$109.99
Theory of Magnetostatic Waves

Theory of Magnetostatic Waves

$89.00
Europeanization, European Integration and Financial Services

Europeanization, European Integration and Financial Services

$109.99
Control Applications in Modern Power Systems

Control Applications in Modern Power Systems

$249.99
Belief Functions: Theory and Applications

Belief Functions: Theory and Applications

$39.99
Mehrfachregelungen. Grundlagen einer Systemtheorie

Mehrfachregelungen. Grundlagen einer Systemtheorie

$74.99
Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design

$39.99
Software Verification

Software Verification

$59.99
Salzburg, 6. bis 8. September 1948

Salzburg, 6. bis 8. September 1948

$4.99
Medicine and Business

Medicine and Business

$79.99
previous
next