Results 1 to 10 of about 18,842 (275)

The Mathematical Foundation of Post-Quantum Cryptography [PDF]

open access: yesResearch
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, a Canadian company D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj   +2 more sources

Some Mathematical Problems Behind Lattice-Based Cryptography

open access: yesCryptography
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj   +3 more sources

New bounds of the smoothing parameter for lattices. [PDF]

open access: yesPLoS ONE
The smoothing parameter on lattices is crucial for lattice-based cryptographic design. In this study, we establish a new upper bound for the lattice smoothing parameter, which represents an improvement over several significant classical findings. For one-
Heng Guo   +3 more
doaj   +2 more sources

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

open access: yesCryptography, 2022
Lattice-based cryptography is centered around the hardness of problems on lattices. A lattice is a grid of points that stretches to infinity. With the development of quantum computers, existing cryptographic schemes are at risk because the underlying ...
Harshana Bandara   +3 more
doaj   +1 more source

R-LWE-Based Distributed Key Generation and Threshold Decryption

open access: yesMathematics, 2022
Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography.
Ferran Alborch   +2 more
doaj   +1 more source

Improved Plantard Arithmetic for Lattice-based Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper presents an improved Plantard’s modular arithmetic (Plantard arithmetic) tailored for Lattice-Based Cryptography (LBC). Based on the improved Plantard arithmetic, we present faster implementations of two LBC schemes, Kyber and NTTRU, running ...
Junhao Huang   +6 more
doaj   +3 more sources

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy