: Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
: Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
: Post-Quantum Cryptography
: Springer-Verlag
: 9783540887027
: 1
: CHF 142.20
:
: Wahrscheinlichkeitstheorie, Stochastik, Mathematische Statistik
: English
: 246
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.



Daniel J. Bernstein is a research professor in the Department of Computer Science at the University of Illinois at Chicago. Professor Bernstein has received a U.S. National
Science Foundation CAREER award, a Cyber Trust award, three more U.S.government grants, and a Sloan Research Fellowship for his research in computational number theory, cryptography, and computer security. He is the author of several dozen papers and two of the Internet's most popular server software packages, djbdns and qmail.

Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technische Universität Darmstadt and an associate editor of the  Journal of Cryptology. He received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. He also received the Karl Heinz-Beckurts Award for  technology transfer. He is a member of the German Academy of Science and Engieneering.

Erik Dahmen is a PhD student in Prof. Buchmann's research group at the Technische Universität Darmstadt. He received his diploma degree in Mathematics from the Technische Universität Darmstadt in 2006. Erik Dahmen is the author of various research papers on hash-based cryptography.

Preface5
Contents6
List of Contributors8
Introduction to post-quantum cryptography9
1 Is cryptography dead?9
2 A taste of post-quantum cryptography14
3 Challenges in post-quantum cryptography19
4 Comparison to quantum cryptography21
Quantum computing23
1 Classical cryptography and quantum computing23
2 The computational model27
3 The quantum Fourier transform30
4 The hidden subgroup problem33
5 Search algorithms37
6 Outlook39
References40
Hash-based Digital Signature Schemes43
1 Hash based one-time signature schemes44
2 Merkle’s tree authentication scheme48
3 One-time key-pair generation using an PRNG52
4 Authentication path computation54
5 Tree chaining77
6 Distributed signature generation81
7 Security of the Merkle Signature Scheme89
References99
Code-based cryptography103
1 Introduction103
2 Cryptosystems104
3 The security of computing syndromes as one-way function114
4 Codes and structures124
5 Practical aspects135
6 Annex145
References149
Lattice-based Cryptography155
1 Introduction155
2 Preliminaries160
3 Finding Short Vectors in Random q-ary Lattices162
4 Hash Functions165
5 Public Key Encryption Schemes173
6 Digital Signature Schemes188
7 Other Cryptographic Primitives193
8 Open Questions194
References195
Multivariate Public Key Cryptography201
1 Introduction201
2 The Basics of Multivariate PKCs202
3 Examples of Multivariate PKCs206
4 Basic Constructions and Variations210
5 Standard Attacks223
6 The Future237
References242
Index251