Results 121 to 130 of about 159 (153)
Some of the next articles are maybe not open access.

A post-quantum signcryption scheme using isogeny based cryptography

Journal of Information Security and Applications, 2022
Kunal Dey   +3 more
openaire   +1 more source

Enhancing Data Protection and Covert Communication in Cloud Environments with Isogeny Based Cryptography and Spread Spectrum Steganography

Journal of Machine and Computing
The rise of cloud computing has changed how individuals and organizations store and communicate data, but it additionally caused significant concerns about information security and confidentiality. In order to improve data protection and allow covert communication in cloud environments, this research suggests a unique approach that combines spread ...
Shivaramakrishna D, Nagaratna M
openaire   +1 more source

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Throughput-Optimized Implementation of Isogeny-based Cryptography on Vectorized ARM SVE Processor

2022 Tenth International Symposium on Computing and Networking (CANDAR), 2022
Pengchang Ren   +2 more
openaire   +1 more source

The Glue-and-Split Attack: Breaking SIDH and the Road Ahead for Isogeny-Based Cryptography

The Supersingular Isogeny Diffie-Hellman (SIDH) key exchange protocol, along with its encapsulation variant SIKE, used to be seen as some of the most promising options for post-quantum cryptography. But everything changed in July 2022 when Wouter Castryck and Thomas Decru unveiled the "glue-and-split" attack, which effectively broke SIDH and SIKE in ...
Bordoloi, Nayan Jyoti   +1 more
openaire   +1 more source

Entanglement-based secure quantum cryptography over 1,120 kilometres

Nature, 2020
Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly  

Advances in quantum cryptography

Advances in Optics and Photonics, 2020
Stefano Pirandola   +2 more
exaly  

Home - About - Disclaimer - Privacy