Results 121 to 130 of about 159 (153)
Some of the next articles are maybe not open access.
A post-quantum signcryption scheme using isogeny based cryptography
Journal of Information Security and Applications, 2022Kunal Dey +3 more
openaire +1 more source
Journal of Machine and Computing
The rise of cloud computing has changed how individuals and organizations store and communicate data, but it additionally caused significant concerns about information security and confidentiality. In order to improve data protection and allow covert communication in cloud environments, this research suggests a unique approach that combines spread ...
Shivaramakrishna D, Nagaratna M
openaire +1 more source
The rise of cloud computing has changed how individuals and organizations store and communicate data, but it additionally caused significant concerns about information security and confidentiality. In order to improve data protection and allow covert communication in cloud environments, this research suggests a unique approach that combines spread ...
Shivaramakrishna D, Nagaratna M
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Throughput-Optimized Implementation of Isogeny-based Cryptography on Vectorized ARM SVE Processor
2022 Tenth International Symposium on Computing and Networking (CANDAR), 2022Pengchang Ren +2 more
openaire +1 more source
The Glue-and-Split Attack: Breaking SIDH and the Road Ahead for Isogeny-Based Cryptography
The Supersingular Isogeny Diffie-Hellman (SIDH) key exchange protocol, along with its encapsulation variant SIKE, used to be seen as some of the most promising options for post-quantum cryptography. But everything changed in July 2022 when Wouter Castryck and Thomas Decru unveiled the "glue-and-split" attack, which effectively broke SIDH and SIKE in ...Bordoloi, Nayan Jyoti +1 more
openaire +1 more source
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly
Meta-optics empowered vector visual cryptography for high security and rapid decryption
Nature Communications, 2023Mingbo Pu, Xiangang Luo
exaly
Advances in quantum cryptography
Advances in Optics and Photonics, 2020Stefano Pirandola +2 more
exaly

