Results 11 to 20 of about 1,416 (297)

Embedded lattice-based cryptography

open access: green, 2022
A quantum computer powerful enough to run Shor's algorithm could emerge and thus threaten the security provided by the currently deployed asymmetric cryptography. Such a computer can break the entire cryptography based on the hardness of integer factorization or discrete logarithm.
Simon Montoya
openalex   +3 more sources

Portable Implementation of Lattice-based Cryptography using JavaScript

open access: gold2015 Third International Symposium on Computing and Networking (CANDAR), 2016
Lattice-based cryptography has attracted a high degree of attention in the cryptologic research community. It is expected to be in wide use in the foreseeable future once large quantum computers are in sight. In addition, JavaScript is a standard programming language for Web applications. It is now supported on a wide variety of computing platforms and
Ye Yuan   +4 more
openalex   +4 more sources

Algorithm and Cube-Lattice-Based Cryptography

open access: bronzeInternational Journal of Research Publication and Reviews, 2023
Michael N. John, Udoaka Otobong G
openalex   +2 more sources

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

open access: yesCryptography, 2022
Lattice-based cryptography is centered around the hardness of problems on lattices. A lattice is a grid of points that stretches to infinity. With the development of quantum computers, existing cryptographic schemes are at risk because the underlying ...
Harshana Bandara   +3 more
doaj   +1 more source

R-LWE-Based Distributed Key Generation and Threshold Decryption

open access: yesMathematics, 2022
Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography.
Ferran Alborch   +2 more
doaj   +1 more source

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

Post-quantum cryptography Algorithm's standardization and performance analysis

open access: yesArray, 2022
-Quantum computer is no longer a hypothetical idea. It is the world's most important technology and there is a race among countries to get supremacy in quantum technology.
Manish Kumar
doaj   +1 more source

Home - About - Disclaimer - Privacy