LEADER 01187cam2 22003011 450 001 SOBE00085129 005 20251205093358.0 010 $a9791222313153 100 $a20251204d2024 |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $aSguardi sociologici sul vivere in cittą$fa cura di Lucio d'Alessandro, Stefania Ferraro, Fabrizio Chello 210 $aSesto San Giovanni (Mi)$cMimesis$d2024 215 $a293 p.$cill.$d21 cm 461 1$1001SOBE00053556$12001 $aCartografie sociali : rivista di sociologia e scienze$v17 (2024) 500 11$aSguardi sociologici sul vivere in cittą$3SOBA00036363$94462557 702 1$aD'Alessandro, Lucio <1951->$3AF00009348$4070 702 1$aFerraro, Stefania$3A600200039623$4070 702 1$aChello, Fabrizio$3SOBA00008919$4070 801 0$aIT$bUNISOB$c20251205$gRICA 850 $aUNISOB 852 $aUNISOB$j300$m187308 912 $aSOBE00085129 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a300$b005443$gSI$d187308$n20251204$_15$rdono$tN$[15$1Spinosa$2UNISOB$3UNISOB$420251204112010.0$520251204112052.0$6Spinosa 996 $aSguardi sociologici sul vivere in cittą$94462557 997 $aUNISOB LEADER 05000nam 22008655 450 001 9910299568803321 005 20251202120325.0 010 $a981-10-5065-1 024 7 $a10.1007/978-981-10-5065-7 035 $a(CKB)4340000000062865 035 $a(DE-He213)978-981-10-5065-7 035 $a(MiAaPQ)EBC4925113 035 $a(PPN)203667271 035 $a(MiAaPQ)EBC6235583 035 $a(EXLCZ)994340000000062865 100 $a20170725d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMathematical Modelling for Next-Generation Cryptography $eCREST Crypto-Math Project /$fedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong 205 $a1st ed. 2018. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2018. 215 $a1 online resource (VIII, 368 p. 23 illus., 6 illus. in color.) 225 1 $aMathematics for Industry,$x2198-3518 ;$v29 311 08$a981-10-5064-3 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $a1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. . 330 $aThis book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts. 410 0$aMathematics for Industry,$x2198-3518 ;$v29 606 $aData structures (Computer science) 606 $aInformation theory 606 $aData protection 606 $aEngineering mathematics 606 $aEngineering$xData processing 606 $aNumber theory 606 $aElementary particles (Physics) 606 $aQuantum field theory 606 $aQuantum physics 606 $aData Structures and Information Theory 606 $aData and Information Security 606 $aMathematical and Computational Engineering Applications 606 $aNumber Theory 606 $aElementary Particles, Quantum Field Theory 606 $aQuantum Physics 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aData protection. 615 0$aEngineering mathematics. 615 0$aEngineering$xData processing. 615 0$aNumber theory. 615 0$aElementary particles (Physics). 615 0$aQuantum field theory. 615 0$aQuantum physics. 615 14$aData Structures and Information Theory. 615 24$aData and Information Security. 615 24$aMathematical and Computational Engineering Applications. 615 24$aNumber Theory. 615 24$aElementary Particles, Quantum Field Theory. 615 24$aQuantum Physics. 676 $a652.8 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWakayama$b Masato$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTanaka$b K.$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKunihiro$b Noboru$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKimoto$b Kazufumi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDuong$b Dung Hoang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299568803321 996 $aMathematical Modelling for Next-Generation Cryptography$92545796 997 $aUNINA