Results 21 to 30 of about 963,035 (329)
Public-key code-based cryptography
Alexandr Kuznetsov +3 more
openalex +2 more sources
Code-based Cryptography in IoT: A HW/SW Co-Design of HQC [PDF]
Recent advances in quantum computing pose a serious threat on the security of widely used public-key cryp-tosystems. Thus, new post-quantum cryptographic algorithms have been proposed as part of the associated US NIST process to enable secure, encrypted ...
Maximilian Schöffel +2 more
semanticscholar +1 more source
McBits: Fast Constant-Time Code-Based Cryptography [PDF]
This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast
D. Bernstein, T. Chou, P. Schwabe
semanticscholar +4 more sources
Survey of code-based digital signatures
The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.
SONG Yongcheng +2 more
doaj +3 more sources
Cryptography: Advances in Secure Communication and Data Protection [PDF]
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin +4 more
doaj +1 more source
Post-quantum cryptography Algorithm's standardization and performance analysis
-Quantum computer is no longer a hypothetical idea. It is the world's most important technology and there is a race among countries to get supremacy in quantum technology.
Manish Kumar
doaj +1 more source
As quantum computing technology evolves, it poses greater risks to current cryptography schemes such as RSA and Elliptic Curve Cryptography (ECC), widely used to secure digital communications These classical algorithms are based on mathematical problems
Swapnali N Tambe-Jagtap
doaj +1 more source
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU
Postquantum cryptography requires a different set of arithmetic routines from traditional public-key cryptography such as elliptic curves. In particular, in each of the lattice-based NISTPQC Key Establishment finalists, every state-ofthe-art optimized ...
Vincent Hwang +6 more
doaj +3 more sources
Network Coding-Based Post-Quantum Cryptography [PDF]
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The secure network-coding scheme we offer is hybrid in the sense that it combines information-theory security with public-key cryptography.
Alejandro Cohen +3 more
openaire +2 more sources
Recent Progress in Code-Based Cryptography [PDF]
The last three years have witnessed tremendous progress in the understanding of code-based cryptography. One of its most promising applications is the design of cryptographic schemes with exceptionally strong security guarantees and other desirable properties.
Pierre-Louis Cayrel +4 more
semanticscholar +2 more sources

