Results 21 to 30 of about 963,035 (329)

Public-key code-based cryptography

open access: diamondUkrainian Information Security Research Journal, 2016
Alexandr Kuznetsov   +3 more
openalex   +2 more sources

Code-based Cryptography in IoT: A HW/SW Co-Design of HQC [PDF]

open access: yesWorld Forum on Internet of Things, 2022
Recent advances in quantum computing pose a serious threat on the security of widely used public-key cryp-tosystems. Thus, new post-quantum cryptographic algorithms have been proposed as part of the associated US NIST process to enable secure, encrypted ...
Maximilian Schöffel   +2 more
semanticscholar   +1 more source

McBits: Fast Constant-Time Code-Based Cryptography [PDF]

open access: yesWorkshop on Cryptographic Hardware and Embedded Systems, 2013
This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast
D. Bernstein, T. Chou, P. Schwabe
semanticscholar   +4 more sources

Survey of code-based digital signatures

open access: yes网络与信息安全学报, 2021
The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.
SONG Yongcheng   +2 more
doaj   +3 more sources

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

Post-quantum cryptography Algorithm's standardization and performance analysis

open access: yesArray, 2022
-Quantum computer is no longer a hypothetical idea. It is the world's most important technology and there is a race among countries to get supremacy in quantum technology.
Manish Kumar
doaj   +1 more source

A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions

open access: yesShifra, 2023
As quantum computing technology evolves, it poses greater risks to current cryptography schemes such as RSA and Elliptic Curve Cryptography (ECC), widely used to secure digital communications These classical algorithms are based on mathematical problems
Swapnali N Tambe-Jagtap
doaj   +1 more source

Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Postquantum cryptography requires a different set of arithmetic routines from traditional public-key cryptography such as elliptic curves. In particular, in each of the lattice-based NISTPQC Key Establishment finalists, every state-ofthe-art optimized ...
Vincent Hwang   +6 more
doaj   +3 more sources

Network Coding-Based Post-Quantum Cryptography [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2021
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The secure network-coding scheme we offer is hybrid in the sense that it combines information-theory security with public-key cryptography.
Alejandro Cohen   +3 more
openaire   +2 more sources

Recent Progress in Code-Based Cryptography [PDF]

open access: yesInternational Symposium on Algorithms, 2011
The last three years have witnessed tremendous progress in the understanding of code-based cryptography. One of its most promising applications is the design of cryptographic schemes with exceptionally strong security guarantees and other desirable properties.
Pierre-Louis Cayrel   +4 more
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy