Quantum Nonlinear Function Obfuscation Theory And Application

Download Quantum Nonlinear Function Obfuscation Theory And Application PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Quantum Nonlinear Function Obfuscation Theory And Application book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Quantum Nonlinear Function Obfuscation Theory and Application

This book summarizes the main research results and preliminaries of quantum obfuscation and systematically introduces quantum obfuscation methods. Quantum obfuscation is an important and cross-cutting research topic in quantum cryptography and quantum computation. Quantum cryptography and quantum computation have made great progress in this century. However, academic research on the theory of quantum obfuscation is still at a blank stage. The author combines the theory of quantum computation and obfuscation and develop the theory of quantum obfuscation. Until now, a series of representative schemes have been proposed. From the viewpoint of quantum nonlinear function obfuscation, the author designs a series of quantum obfuscation schemes by means of combining obfuscation theory with quantum computation. Furthermore, the author describes the quantum cryptographic protocols based on quantum obfuscation. These methods will provide effective tools for the research and application of quantum cryptography.
Secure Quantum Network Coding Theory

This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the book subsequently provides a series of quantum network coding schemes based on the integration of quantum cryptography into quantum communication. Furthermore, it describes the general security analysis method for quantum cryptographic protocols. Accordingly, the book equips readers with effective tools for researching and applying quantum network coding.
Towards Hardware-Intrinsic Security

Author: Ahmad-Reza Sadeghi
language: en
Publisher: Springer Science & Business Media
Release Date: 2010-11-03
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.