The first book to focus on areas that have not yet been fully exploited for cryptographic applications, such as representation theory and mathematical physics
Contributes to a better understanding of the current state of modern cryptography
Develops new advanced mathematical techniques and their applications in next-generation cryptography Presents contributions by leading international researchers in the field of cryptography, representation theory, number theory, and quantum physics, among others
Table of Contents:
1. Algebraic Geometry.- 2. Number Theory.- 3. Theory of Computation.- 4. Quantum Computation.- 5. Quantum Field Theory.- 6. Mathematical Physics.- 7. Representation Theory.- 8. Lattice Theory.- 9. Multivariate Polynomial Theory.- 10. Data Encryption.- 11. Digital Signature.- 12. Searchable Encryption.- 13. Obfuscation.- 14. Privacy Protection.- 15. Copyright Protection.- 16. ID-Based Encryption.
About the Author :
Tsuyoshi Takagi
Professor, Kyushu University, Institute of Mathematics for Industry
Masato Wakayama
Professor, Kyushu University, Institute of Mathematics for Industry
Keisuke Tanaka
Associate Professor, Tokyo Institute of Technology, Department of Mathematical and Computing Sciences
Noboru Kunihiro
Associate Professor, The University of Tokyo, Graduate School of Frontier Sciences
Kazufumi Kimoto
Professor, University of the Ryukyus, Department of Mathematical Sciences
Dung Hoang Duong
Assistant Professor, Kyushu University, Institute of Mathematics for Industry
Review :
"The present volume is unique in that it focuses on cryptography's future. It won't come as a surprise to anyone in this field that the future is highly mathematical. ... this book is essentially a collection of research papers, and the prerequisites to understanding it are similar to that of a technical journal aimed at specialists. ... Summing Up: Recommended. Graduate students, researchers, faculty, and professionals." (C. Bauer, Choice, Vol. 55 (10), June, 2018)
"This engaging book looks at novel ideas that are worth exploring. ... I strongly recommend it for the intended audience: graduate students and researchers. Practitioners and libraries will also benefit from this book, which provides new perspectives." (S. V. Nagaraj, Computing Reviews, May, 2018)