Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Practical post-quantum signatures = ...
~
Kim, Kwangjo.
Linked to FindBook
Google Book
Amazon
博客來
Practical post-quantum signatures = FALCON and SOLMAE with Python /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Practical post-quantum signatures/ by Kwangjo Kim.
Reminder of title:
FALCON and SOLMAE with Python /
Author:
Kim, Kwangjo.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xviii, 86 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Chapter.1. Introduction -- Chapter.2. Notations and Definitions -- Chapter.3. Falcon Algorithm -- Chapter 4. SOLMAE Algorithm -- Chapter.5. Basics of Python -- Chapter.6.Checking Falcon with Python -- Chapter.7.Checking SOLMAE with Python -- Chapter.8 Concluding Remarks.
Contained By:
Springer Nature eBook
Subject:
Digital signatures. -
Online resource:
https://doi.org/10.1007/978-3-031-81250-7
ISBN:
9783031812507
Practical post-quantum signatures = FALCON and SOLMAE with Python /
Kim, Kwangjo.
Practical post-quantum signatures
FALCON and SOLMAE with Python /[electronic resource] :by Kwangjo Kim. - Cham :Springer Nature Switzerland :2025. - xviii, 86 p. :ill. (some col.), digital ;24 cm. - SpringerBriefs in information security and cryptography,2731-9563. - SpringerBriefs in information security and cryptography..
Chapter.1. Introduction -- Chapter.2. Notations and Definitions -- Chapter.3. Falcon Algorithm -- Chapter 4. SOLMAE Algorithm -- Chapter.5. Basics of Python -- Chapter.6.Checking Falcon with Python -- Chapter.7.Checking SOLMAE with Python -- Chapter.8 Concluding Remarks.
The current digital signature methods like RSA, DSA, and ECDSA are relatively simple to understand, and their signing and verification processes operate in comparable time frames. However, in the quantum computing era, cryptographic methods must be designed to withstand both classical and quantum attacks. This requires an in-depth understanding of advanced mathematical concepts like algebraic geometry, lattice theory, Gaussian sampling, and efficient polynomial computation techniques such as FFT and NTT, which are essential for lattice-based cryptosystems. The FALCON algorithm, chosen as a finalist in the NIST Post-Quantum Cryptography (PQC) standardization project, is a lattice-based, hash-and-sign digital signature scheme known for its efficiency and compactness compared to other quantum-resistant signatures like Dilithium and SPHINCS+. Following FALCON's development, the SOLMAE algorithm was introduced in 2021, offering a simplified signing process within the same GPV framework and also implemented in Python for easier accessibility. This monograph provides a practical and educational introduction to post-quantum digital signatures, focusing on the FALCON and SOLMAE algorithms. The material aims to bridge the gap between theory and practice, offering hands-on knowledge of post-quantum cryptographic techniques. With a focus on clear, practical examples using Python, this book is a valuable resource for anyone looking to understand or implement quantum-secure digital signatures.
ISBN: 9783031812507
Standard No.: 10.1007/978-3-031-81250-7doiSubjects--Topical Terms:
1085466
Digital signatures.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Practical post-quantum signatures = FALCON and SOLMAE with Python /
LDR
:02899nmm a2200361 a 4500
001
2408552
003
DE-He213
005
20250215115512.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031812507
$q
(electronic bk.)
020
$a
9783031812491
$q
(paper)
024
7
$a
10.1007/978-3-031-81250-7
$2
doi
035
$a
978-3-031-81250-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
K49 2025
100
1
$a
Kim, Kwangjo.
$3
1072465
245
1 0
$a
Practical post-quantum signatures
$h
[electronic resource] :
$b
FALCON and SOLMAE with Python /
$c
by Kwangjo Kim.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xviii, 86 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in information security and cryptography,
$x
2731-9563
505
0
$a
Chapter.1. Introduction -- Chapter.2. Notations and Definitions -- Chapter.3. Falcon Algorithm -- Chapter 4. SOLMAE Algorithm -- Chapter.5. Basics of Python -- Chapter.6.Checking Falcon with Python -- Chapter.7.Checking SOLMAE with Python -- Chapter.8 Concluding Remarks.
520
$a
The current digital signature methods like RSA, DSA, and ECDSA are relatively simple to understand, and their signing and verification processes operate in comparable time frames. However, in the quantum computing era, cryptographic methods must be designed to withstand both classical and quantum attacks. This requires an in-depth understanding of advanced mathematical concepts like algebraic geometry, lattice theory, Gaussian sampling, and efficient polynomial computation techniques such as FFT and NTT, which are essential for lattice-based cryptosystems. The FALCON algorithm, chosen as a finalist in the NIST Post-Quantum Cryptography (PQC) standardization project, is a lattice-based, hash-and-sign digital signature scheme known for its efficiency and compactness compared to other quantum-resistant signatures like Dilithium and SPHINCS+. Following FALCON's development, the SOLMAE algorithm was introduced in 2021, offering a simplified signing process within the same GPV framework and also implemented in Python for easier accessibility. This monograph provides a practical and educational introduction to post-quantum digital signatures, focusing on the FALCON and SOLMAE algorithms. The material aims to bridge the gap between theory and practice, offering hands-on knowledge of post-quantum cryptographic techniques. With a focus on clear, practical examples using Python, this book is a valuable resource for anyone looking to understand or implement quantum-secure digital signatures.
650
0
$a
Digital signatures.
$3
1085466
650
0
$a
Quantum computing
$x
Security measures.
$3
3781119
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Quantum Computing.
$3
1620399
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Quantum Communications and Cryptography.
$3
3595689
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in information security and cryptography.
$3
3630645
856
4 0
$u
https://doi.org/10.1007/978-3-031-81250-7
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514050
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login