Results 91 to 100 of about 1,519 (205)

Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee   +2 more
doaj   +1 more source

A Quantum-Resistant Implementation of a Digital Cash System with Valued and no-Valued e-Coins [PDF]

open access: yes
[EN] Digital cash is a form of money that is minted, stored, and spent digitally. As opposed to debit or credit cards, it enables untraceable payments in the sense that the payer can acquire products while keeping their identity secret.
Miret, Josep M.   +2 more
core  

Benchmarking Post-Quantum Signatures and KEMs on General-Purpose CPUs Using a TCP Client–Server Testbed

open access: yesComputers
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez   +3 more
doaj   +1 more source

Piezoelectric interfacial waves in langasite and dilithium tetraborate

open access: yesArchives of Acoustics, 2014
Waves propagating along a perfectly conducting plane embedded in a piezoelectric medium are investigated. Numerical analysis of trigonal langasite (LGS) and cubic dilithium tetraborate (LBO) crystals shows that such waves exist for many orientations of ...
E. DANICKI, W. LAPRUS
doaj  

Design and Implementation of a Quantum-Assisted Digital Signature

open access: yesCryptography
We propose a new quantum-assisted digital signature (Q-DS) protocol based on the composite of truly random symmetric keys generated by quantum key distribution with secure standardized hash functions, which allows for high parameterization to provide ...
Marta Irene García-Cid   +4 more
doaj   +1 more source

High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium

open access: yesIEEE Access
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number Theoretic Transform (NTT) in CRYSTAL-Kyber and CRYSTAL-Dilithium.
Trong-Hung Nguyen   +3 more
openaire   +2 more sources

Some Mathematical Problems Behind Lattice-Based Cryptography

open access: yesCryptography
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj   +1 more source

Quantum-Resistant TLS 1.3:A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography [PDF]

open access: yes
Hybrid authenticated key exchange combines cryptography key material from different sources (classical, quantum and post-quantum cryptography) to build protocols that are resilient to catastrophic failures, technology advances and future cryptanalytic ...
Aguilera, Abraham Cano   +4 more
core   +1 more source

Lightweight Post-Quantum Cryptography: Applications and Countermeasures in Internet of Things, Blockchain, and E-Learning

open access: yesEngineering Proceedings
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen   +5 more
doaj   +1 more source

Quantum Computing: Computing of the Future Made Reality [PDF]

open access: yes
—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics.
Mathis, Janelle
core   +1 more source

Home - About - Disclaimer - Privacy