Results 111 to 120 of about 2,168 (195)
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez +3 more
doaj +1 more source
Aspects of Elliptic and Hyperelliptic Curve Isogeny-based Cryptography
With the advent of quantum computers in mind, a lot of attention in the field of cryptography has shifted towards new and different mathematical hard problems. One of these shifts is the change from the discrete logarithm problem on a single elliptic curve to isogenies between distinct elliptic curves.
openaire +1 more source
The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]
Tukur M +6 more
europepmc +1 more source
Isogeny-Based Post-Quantum Cryptography
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased cryptography. Because of its certain properties like the hard problem of computing isogenies between two elliptic curves, it makes it to be one of the few candidates for post-quantum cryptography.
openaire +1 more source
With the development of quantum computing technology, the current cryptographic systems face significant threats. Quantum algorithms, such as Shor’s algorithm, have demonstrated the capability to efficiently solve mathematical problems upon which ...
Anitha Kumari Kumarasamy +3 more
doaj +1 more source
Post-quantum distributed ledger technology: a systematic survey. [PDF]
Parida NK +4 more
europepmc +1 more source
Non-Invertible Public Key Certificates. [PDF]
Lizama-Perez LA, López R JM.
europepmc +1 more source
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source
Isogenies on twisted Hessian curves. [PDF]
Perez FL, Dang T, Fouotsa E, Moody D.
europepmc +1 more source
Security framework to healthcare robots for secure sharing of healthcare data from cloud. [PDF]
Jain S, Doriya R.
europepmc +1 more source

