Multivariate public key cryptosystems /

Saved in:
Bibliographic Details
Author / Creator:Ding, Jintai.
Imprint:New York, N.Y. ; [London] : Springer, ©2006.
Description:xviii, 260 pages : illustrations ; 25 cm.
Language:English
Series:Advances in information security ; 25
Advances in information security ; 25.
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/6117390
Hidden Bibliographic Details
Other authors / contributors:Gower, Jason E.
Schmidt, Dieter S.
ISBN:9780387322292
0387322299
9780387369464
0387369465
Notes:Includes bibliographical references and index.
Summary:"Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative. Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find this book a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material."--Publisher's website.
Other form:Online version: Ding, Jintai. Multivariate public key cryptosystems. New York, N.Y. ; [London] : Springer, ©2006
Online version: Ding, Jintai. Multivariate public key cryptosystems. New York, N.Y. ; [London] : Springer, ©2006
Table of Contents:
  • Overview
  • Matsumoto-Imai cryptosystems
  • Oil-Vinegar signature schemes
  • Hidden field equations
  • Internal perturbation
  • Triangular schemes
  • Direct attacks
  • Future research.