Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Quantum computers will break the security of almost all the public-key cryptosystems used in practice. This book focus on two classes of cryptography that can resist these emerging attacks. In the first part, we introduce coding theory and give an overview of code-based cryptography. The main contribution is an attack on two promising cryptosystem (joint work with Gregor Leander). We also present a deterministic polynomial-time algorithm to solve the Goppa Code Distinguisher problem for high rate codes (joint work with Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret and Jean-Pierre Tillich). In the second part, we give an overview of hash based signature schemes that are a good quantum resistant alternative to the used signature schemes. We propose a new variant of the classical one-time signature schemes based on (near-)collisions resulting in two-time signature schemes and give a new, simple and efficient algorithm for traversing a tree in tree-based signature schemes (joint work with Lars Knudsen and Soren Thomsen).
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Quantum computers will break the security of almost all the public-key cryptosystems used in practice. This book focus on two classes of cryptography that can resist these emerging attacks. In the first part, we introduce coding theory and give an overview of code-based cryptography. The main contribution is an attack on two promising cryptosystem (joint work with Gregor Leander). We also present a deterministic polynomial-time algorithm to solve the Goppa Code Distinguisher problem for high rate codes (joint work with Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret and Jean-Pierre Tillich). In the second part, we give an overview of hash based signature schemes that are a good quantum resistant alternative to the used signature schemes. We propose a new variant of the classical one-time signature schemes based on (near-)collisions resulting in two-time signature schemes and give a new, simple and efficient algorithm for traversing a tree in tree-based signature schemes (joint work with Lars Knudsen and Soren Thomsen).