Results 111 to 120 of about 2,168 (195)

Benchmarking Post-Quantum Signatures and KEMs on General-Purpose CPUs Using a TCP Client–Server Testbed

open access: yesComputers
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez   +3 more
doaj   +1 more source

Aspects of Elliptic and Hyperelliptic Curve Isogeny-based Cryptography

open access: yes, 2022
With the advent of quantum computers in mind, a lot of attention in the field of cryptography has shifted towards new and different mathematical hard problems. One of these shifts is the change from the discrete logarithm problem on a single elliptic curve to isogenies between distinct elliptic curves.
openaire   +1 more source

The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]

open access: yesFront Big Data, 2023
Tukur M   +6 more
europepmc   +1 more source

Isogeny-Based Post-Quantum Cryptography

open access: yes, 2019
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased cryptography. Because of its certain properties like the hard problem of computing isogenies between two elliptic curves, it makes it to be one of the few candidates for post-quantum cryptography.
openaire   +1 more source

Ranking of post-quantum cryptography digital signature schemes using evaluation based on distance from average solutions

open access: yesMajlesi Journal of Electrical Engineering
With the development of quantum computing technology, the current cryptographic systems face significant threats. Quantum algorithms, such as Shor’s algorithm, have demonstrated the capability to efficiently solve mathematical problems upon which ...
Anitha Kumari Kumarasamy   +3 more
doaj   +1 more source

Post-quantum distributed ledger technology: a systematic survey. [PDF]

open access: yesSci Rep, 2023
Parida NK   +4 more
europepmc   +1 more source

Non-Invertible Public Key Certificates. [PDF]

open access: yesEntropy (Basel), 2021
Lizama-Perez LA, López R JM.
europepmc   +1 more source

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

Isogenies on twisted Hessian curves. [PDF]

open access: yesJ Math Cryptol, 2021
Perez FL, Dang T, Fouotsa E, Moody D.
europepmc   +1 more source

Home - About - Disclaimer - Privacy