This open access book presents mathematical foundations for cryptography securely used in the era of quantum computers.

In particular, this book aims to deepen the basic mathematics of post-quantum cryptography, model the strongest possible attacks such as side-channel attacks, and construct cryptographic protocols that guarantee security against such attacks.

This book is a sequel of the successful book entitled by ``Mathematical Modeling for Next-Generation Cryptography - CREST Crypto-Math Project'' which was published in 2018.

The book is suitable for use in an advanced graduate course in mathematical cryptography and as a reference book for experts.

Les mer

1. Algebraic Geometry.- 2. Number Theory.- 3. Theory of Computation.- 4. Quantum Computation.- 5. Quantum Field Theory.- 6. Mathematical Physics.- 7. Representation Theory.- 8. Lattice Theory.- 9. Multivariate Polynomial Theory.- 10. Data Encryption.- 11. Digital Signature.- 12. Searchable Encryption.- 13. Obfuscation.- 14. Privacy Protection.- 15. Copyright Protection.- 16. ID-based Encryption.

Les mer

This open access book presents mathematical foundations for cryptography securely used in the era of quantum computers.

In particular, this book aims to deepen the basic mathematics of post-quantum cryptography, model the strongest possible attacks such as side-channel attacks, and construct cryptographic protocols that guarantee security against such attacks.

This book is a sequel of the successful book entitled by ``Mathematical Modeling for Next-Generation Cryptography - CREST Crypto-Math Project'' which was published in 2018.

The book is suitable for use in an advanced graduate course in mathematical cryptography and as a reference book for experts.

Les mer
Contributes to a better understanding of current state of modern cryptography Develops new advanced mathematical techniques and their applications in the post-quantum cryptography Focuses on the areas that have not yet been fully exploited for the representation theory, and mathematical physics Is open access, which means that you have free and unlimited access
Les mer
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Les mer
Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Les mer

Produktdetaljer

ISBN
9789819612178
Publisert
2025-06-24
Utgiver
Vendor
Springer Nature Switzerland AG
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, UP, 06, 05
Språk
Product language
Engelsk
Format
Product format
Innbundet

Biographical note

Tsuyoshi Takagi is a professor in the Department of Mathematical Informatics at the University of Tokyo. His current research interests are information security and cryptography. He received the Ph.D. from the Technical University of Darmstadt in 2001. He received IEICE Achievement Award in 2013 and JSPS Prize in 2014. He was a program chair of the 7th International Conference on Post-Quantum Cryptography, PQCrypto 2016.

Masato Wakayama is the Fundamental Mathematics Research principal of NTT Institute for Fundamental Mathematics in Nippon Telegraph and Telephone Corporation. He also serves as a principal fellow at Center for Research and Development Strategy of Japan Science and Technology Agency and a professor emeritus at Institute of Mathematics for Industry of Kyushu University. His current research interests are representation theory and its applications to number theory and quantum physics. He received the Ph.D. from Hiroshima University in 1985. He received Nice-Step-Researcher Award in 2007 by Ministry of Education, Culture, Sports, Science, and Technology (MEXT). He also managed various research projects on mathematics for industry such as Global COE Program “Education and Research Hub for Mathematics-for-Industry” by MEXT.

 

Noboru Kunihiro is a professor in the Department of Faculty of Engineering, Information, and Systems at the University of Tsukuba. His current research interests are information security and cryptography. He received the Ph.D. from the University of Tokyo in 2001. He has served as program committees of many international conferences on information security, for example, a program chair of the 5th International Workshop on Security, IWSEC2010.

 

Keisuke Tanaka is a professor in School of Computing at Tokyo Institute of Technology. His current research interests are cryptography and computational complexity theory. He received the Ph.D. from Japan Advanced Institute of Science and Technology in 1997. He received IEICE Distinguished Educational Practitioners Award in 2020.

 

Kazufumi Kimoto is a professor in the Department of Mathematical Sciences at the University of the Ryukyus. His current research interests are representation theory and its applications to cryptography. He received the Ph.D. from Kyushu University in 2003. He received Inoue Research Award for Young Scientists in 2003.

 

Momonari Kudo is an assistant professor in the Faculty of Information Engineering at Fukuoka Institute of Technology. His current research interests are computational algebraic geometry and its applications to cryptography. He received the Ph.D. from Kyushu University in 2017. He received JSIAM Best Presentation Award in 2017 and JSSAC Research Award for Young Scientists in 2020.