Results 41 to 50 of about 2,892 (213)

Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation

open access: yesIEEE Access
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile   +6 more
doaj   +1 more source

A Survey of Post-Quantum Cryptography: Start of a New Race

open access: yesCryptography, 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
doaj   +1 more source

Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order

open access: yes, 2017
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core   +1 more source

Connected three-body terms in single-reference unitary many-body theories: Iterative and perturbative approximations

open access: yes, 2020
This work introduces various approaches to include connected three-body terms in unitary many-body theories, focusing a representative example on the driven similarity renormalization group (DSRG).
Evangelista, Francesco A., Li, Chenyang
core   +1 more source

A Prototype for evaluating Post-Quantum Cryptography on resource-constrained Hardware with real-world Smart City Sensor Data [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
As the threat of quantum computing to classical cryptography grows, the transition to post-quantum cryptographic (PQC) systems becomes essential—particularly for smart city infrastructures that rely heavily on secure, real-time sensor data.
J. Seedorf   +5 more
doaj   +1 more source

A Flexible NTT-Based Multiplier for Post-Quantum Cryptography

open access: yesIEEE Access, 2023
In this work an NTT-based (Number Theoretic Transform) multiplier for code-based Post-Quantum Cryptography (PQC) is presented, supporting Quasi Cyclic Low/Moderate-Density Parity-Check (QC LDPC/MDPC) codes.
Kristjane Koleci   +3 more
doaj   +1 more source

Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC [PDF]

open access: yes, 2020
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development.
de Jong, Jins   +4 more
core   +3 more sources

Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Postquantum cryptography requires a different set of arithmetic routines from traditional public-key cryptography such as elliptic curves. In particular, in each of the lattice-based NISTPQC Key Establishment finalists, every state-ofthe-art optimized ...
Vincent Hwang   +6 more
doaj   +3 more sources

NIST Post-Quantum Cryptography Standards: A Comprehensive Review of Theoretical Foundations and Implementations

open access: yesIEEE Access
The transition to post-quantum cryptography (PQC) marks a pivotal shift in ensuring digital security, prompted by the potential of quantum computers to compromise classical systems such as Rivest-Shamir-Adlema and elliptic-curve cryptography. In response,
Quang Dang Truong   +3 more
doaj   +1 more source

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices

open access: yesJournal of Cybersecurity and Privacy
The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques.
J. Cameron Patterson   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy