´ë·®±¸¸ÅȨ >
¿Ü±¹µµ¼­
>
´ëÇб³Àç/Àü¹®¼­Àû
>
ÀÚ¿¬°úÇÐ ÀϹÝ

Introduction to Quantum Cryptography
Á¤°¡ 75,000¿ø
ÆǸŰ¡ 75,000¿ø (0% , 0¿ø)
I-Æ÷ÀÎÆ® 2,250P Àû¸³(3%)
ÆǸŻóÅ ÆǸÅÁß
ºÐ·ù ÀÚ¿¬°úÇÐ ÀϹÝ
ÃâÆÇ»ç/¹ßÇàÀÏ Cambridge University Press / 2023.09.14
ÆäÀÌÁö ¼ö 400 page
ISBN 9781316515655
»óÇ°ÄÚµå 356846056
°¡¿ëÀç°í Àç°íºÎÁ·À¸·Î ÃâÆÇ»ç ¹ßÁÖ ¿¹Á¤ÀÔ´Ï´Ù.
 
ÁÖ¹®¼ö·® :
´ë·®±¸¸Å Àü¹® ÀÎÅÍÆÄÅ© ´ë·®ÁÖ¹® ½Ã½ºÅÛÀ» ÀÌ¿ëÇÏ½Ã¸é °ßÀû¿¡¼­ºÎÅÍ ÇàÁ¤¼­·ù±îÁö Æí¸®ÇÏ°Ô ¼­ºñ½º¸¦ ¹ÞÀ¸½Ç ¼ö ÀÖ½À´Ï´Ù.
µµ¼­¸¦ °ßÀûÇÔ¿¡ ´ãÀ¸½Ã°í ½Ç½Ã°£ °ßÀûÀ» ¹ÞÀ¸½Ã¸é ±â´Ù¸®½Ç ÇÊ¿ä¾øÀÌ ÇÒÀιÞÀ¸½Ç ¼ö ÀÖ´Â °¡°ÝÀ» È®ÀÎÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.
¸ÅÁÖ ¹ß¼ÛÇØ µå¸®´Â ÀÎÅÍÆÄÅ©ÀÇ ½Å°£¾È³» Á¤º¸¸¦ ¹Þ¾Æº¸½Ã¸é »óÇ°ÀÇ ¼±Á¤À» ´õ¿í Æí¸®ÇÏ°Ô ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

 ´ë·®±¸¸ÅȨ  > ¿Ü±¹µµ¼­  > ´ëÇб³Àç/Àü¹®¼­Àû  > ÀÚ¿¬°úÇÐ ÀϹÝ

 
Ã¥³»¿ë
¡®If you are intrigued by the prospects of quantum cryptography but not yet familiar with the formalism behind it, then this book is the perfect starting point for you. It playfully introduces the most important concepts in modern quantum cryptography, and at the same time gently but purposefully helps you discover the mathematical framework required to make formal statements.¡¯ Marco Tomamichel, National University of Singapore ¡®Vidick and Wehner cover quantum cryptography in its full beauty and depth. Packed with enlightening examples and comprehensive exercises, this book will likely become an indispensable companion next time I hold lectures on the subject.¡¯ Renato Renner, ETH Zurich ¡®Thomas Vidick and Stephanie Wehner take readers on an insightful exploration of the full landscape of quantum cryptography, skillfully weaving together theory and applications and providing pedagogical quizzes and exercises. The mathematical formalism is rigorous yet approachable, making this book an excellent introduction to this captivating area.¡¯ Anne Broadbent, University of Ottawa
¸ñÂ÷
Preface; 1. Background material; 2. Quantum tools and a first protocol; 3. Quantum money; 4. The power of entanglement; 5. Quantifying information; 6. From imperfect information to (near) perfect security; 7. Distributing keys; 8. Quantum key distribution protocols; 9. Quantum cryptography using untrusted devices; 10. Quantum cryptography beyond key distribution; 11. Security from physical assumptions; 12. Further topics around encryption; 13. Delegated computation; References; Index.

ÀÌ ÃâÆÇ»çÀÇ °ü·Ã»óÇ°
Objective Proficiency Student's Book with Answers with Downloadable Software | Cambridge University Press
Digital Constitutionalism in Europe | Giovanni De Gregorio | Cambridge University Press
CMOS and Beyond | Cambridge University Press | Cambridge University Press
Cognitive Neuroscience | Cambridge University Press
Opera in the Age of Rousseau | David Charlton | Cambridge University Press
 
µµ¼­¸¦ ±¸ÀÔÇϽŠ°í°´ ¿©·¯ºÐµéÀÇ ¼­ÆòÀÔ´Ï´Ù.
ÀÚÀ¯·Î¿î ÀÇ°ß ±³È¯ÀÌ °¡´ÉÇÕ´Ï´Ù¸¸, ¼­ÆòÀÇ ¼º°Ý¿¡ ¸ÂÁö ¾Ê´Â ±ÛÀº »èÁ¦µÉ ¼ö ÀÖ½À´Ï´Ù.

µî·ÏµÈ ¼­ÆòÁß ºÐ¾ß¿Í »ó°ü¾øÀÌ ¸ÅÁÖ ¸ñ¿äÀÏ 5ÆíÀÇ ¿ì¼öÀÛÀ» ¼±Á¤ÇÏ¿©, S-Money 3¸¸¿øÀ» Àû¸³Çص帳´Ï´Ù.
ÃÑ 0°³ÀÇ ¼­ÆòÀÌ ÀÖ½À´Ï´Ù.