Results 91 to 100 of about 1,519 (205)
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee +2 more
doaj +1 more source
A Quantum-Resistant Implementation of a Digital Cash System with Valued and no-Valued e-Coins [PDF]
[EN] Digital cash is a form of money that is minted, stored, and spent digitally. As opposed to debit or credit cards, it enables untraceable payments in the sense that the payer can acquire products while keeping their identity secret.
Miret, Josep M. +2 more
core
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez +3 more
doaj +1 more source
Piezoelectric interfacial waves in langasite and dilithium tetraborate
Waves propagating along a perfectly conducting plane embedded in a piezoelectric medium are investigated. Numerical analysis of trigonal langasite (LGS) and cubic dilithium tetraborate (LBO) crystals shows that such waves exist for many orientations of ...
E. DANICKI, W. LAPRUS
doaj
Design and Implementation of a Quantum-Assisted Digital Signature
We propose a new quantum-assisted digital signature (Q-DS) protocol based on the composite of truly random symmetric keys generated by quantum key distribution with secure standardized hash functions, which allows for high parameterization to provide ...
Marta Irene García-Cid +4 more
doaj +1 more source
High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number Theoretic Transform (NTT) in CRYSTAL-Kyber and CRYSTAL-Dilithium.
Trong-Hung Nguyen +3 more
openaire +2 more sources
Some Mathematical Problems Behind Lattice-Based Cryptography
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj +1 more source
Quantum-Resistant TLS 1.3:A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography [PDF]
Hybrid authenticated key exchange combines cryptography key material from different sources (classical, quantum and post-quantum cryptography) to build protocols that are resilient to catastrophic failures, technology advances and future cryptanalytic ...
Aguilera, Abraham Cano +4 more
core +1 more source
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen +5 more
doaj +1 more source
Quantum Computing: Computing of the Future Made Reality [PDF]
—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics.
Mathis, Janelle
core +1 more source

