Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings - Johannes Buchmann

Post-Quantum Cryptography

Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings

By: Johannes Buchmann (Editor), Jintai Ding (Editor)

Paperback | 6 October 2008

At a Glance

Paperback


$115.02

or 4 interest-free payments of $28.75 with

 or 

Aims to ship in 7 to 10 business days

Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern communication system. In practical applications RSA, DSA, ECDSA, and similar public key cryptosystems are commonly used. Their security depends on assumptions about the di?culty of certain problems in number theory, such as the Integer Prime Factorization Problem or the Discrete Logarithm Problem. However, in 1994 Peter Shor showed that quantum computers could break any public-key cryptosystembased on these hard number theory problems. This means that if a reasonably powerful quantum computer could be built, it would put essentially all modern communication into peril. In 2001, Isaac Chuang and NeilGershenfeldimplemented Shor'salgorithmona7-qubitquantumcomputer. In 2007 a 16-qubit quantum computer was demonstrated by a start-up company with the prediction that a 512-qubit or even a 1024-qubit quantum computer would become available in 2008. Some physicists predicted that within the next 10 to 20 years quantum computers will be built that are su?ciently powerful to implement Shor's ideas and to break all existing public key schemes. Thus we need to look ahead to a future of quantum computers, and we need to prepare the cryptographic world for that future.

More in Data Encryption

Cybercrime : An Encyclopedia of Digital Crime - Nancy E. Marion

RRP $59.99

$49.25

18%
OFF
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Guide to Computer Forensics and Investigations : 7th Edition - Christopher Steuart
Hackers & Painters - Paul Graham

RRP $47.50

$26.50

44%
OFF
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
There's No Such Thing as Crypto Crime : An Investigative Handbook - Nick Furneaux
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $159.95

$130.75

18%
OFF
Blockchain : Blueprint for a New Economy - Melanie Swan

RRP $66.50

$32.75

51%
OFF
Management of Information Security : 6th edition - Michael E. Whitman

RRP $144.95

$119.75

17%
OFF
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown
Programming Bitcoin : Learn How to Program Bitcoin from Scratch - Jimmy Song