Mathematics and computer science, Volume 1

MATHEMATICS AND COMPUTER SCIENCE This first volume in a new multi-volume set gives readers the basic concepts and applications for diverse ideas and innovations in the field of computing together with its growing interactions with mathematics. This new edited volume from Wiley-Scrivener is the first...

Full description

Bibliographic Details
Other Authors: Ghosh, Sharmistha (Editor), Niranjanamurthy, M. (Editor), Deyasi, Krishanu (Editor), Mallik, Biswadip Basu (Editor)
Format: eBook
Language:English
Published: Hoboken, NJ John Wiley & Sons, Inc. 2023
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Chapter 2 Blow Up and Decay of Solutions for a Klein-Gordon Equation With Delay and Variable Exponents
  • 2.1 Introduction
  • 2.2 Preliminaries
  • 2.3 Blow Up of Solutions
  • 2.4 Decay of Solutions
  • Acknowledgment
  • References
  • Chapter 3 Some New Inequalities Via Extended Generalized Fractional Integral Operator for Chebyshev Functional
  • 3.1 Introduction
  • 3.2 Preliminaries
  • 3.3 Fractional Inequalities for the Chebyshev Functional
  • 3.4 Fractional Inequalities in the Case of Extended Chebyshev Functional
  • 5.6 Algorithms Proposed During the NIST Standardization Procedure for Post-Quantum Cryptography
  • 5.7 Hardware Requirements of Post-Quantum Cryptographic Algorithms
  • 5.7.1 NTRUEncrypt
  • 5.7.1.1 Polynomial Multiplication
  • 5.7.1.2 Hardware to Accelerate NTRUEncrypt
  • 5.7.2 Hardware-Software Design to Implement PCQ Algorithms
  • 5.7.3 Implementation of Cryptographic Algorithms Using HLS
  • 5.8 Challenges on the Way of Post-Quantum Cryptography
  • 5.9 Post-Quantum Cryptography Versus Quantum Cryptography
  • 5.10 Future Prospects of Post-Quantum Cryptography
  • References
  • 5.3 Quantum Computing
  • 5.3.1 The Main Aspects of Quantum Computing
  • 5.3.2 Shor's Algorithm
  • 5.3.3 Grover's Algorithm
  • 5.3.4 The Need for Post-Quantum Cryptography
  • 5.4 Algorithms Proposed for Post-Quantum Cryptography
  • 5.4.1 Code-Based Cryptography
  • 5.4.2 Lattice-Based Cryptography
  • 5.4.3 Multivariate Cryptography
  • 5.4.4 Hash-Based Cryptography
  • 5.4.5 Supersingular Elliptic Curve Isogeny Cryptography
  • 5.4.6 Quantum-Resistant Symmetric Key Cryptography
  • 5.5 Launching of the Project Called "Open Quantum Safe"
  • 3.5 Some Other Fracional Inequalities Related to the Extended Chebyshev Functional
  • 3.6 Concluding Remark
  • References
  • Chapter 4 Blow Up of the Higher-Order Kirchhoff-Type System With Logarithmic Nonlinearities
  • 4.1 Introduction
  • 4.2 Preliminaries
  • 4.3 Blow Up for Problem for E (0) < d
  • 4.4 Conclusion
  • References
  • Chapter 5 Developments in Post-Quantum Cryptography
  • 5.1 Introduction
  • 5.2 Modern-Day Cryptography
  • 5.2.1 Symmetric Cryptosystems
  • 5.2.2 Asymmetric Cryptosystems
  • 5.2.3 Attacks on Modern Cryptosystems
  • 5.2.3.1 Known Attacks
  • 5.2.3.2 Side-Channel Attacks