Results 11 to 20 of about 1,873 (168)
First end-to-end PQC protected DPU-to-DPU communications [PDF]
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real-time communications.
Aguilera, A. Cano +4 more
core +4 more sources
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
Blockchain technology ensures accountability, transparency, and redundancy, but its reliance on public‐key cryptography makes it vulnerable to quantum computing threats.
Dominik Marchsreiter
doaj +2 more sources
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes on a conventional ...
Crystal Andrea Roma +2 more
doaj +1 more source
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call in the category of public key encryption schemes.
Miguel Ángel González de la Torre +2 more
doaj +1 more source
Signature Split Method for a PQC-DSA Compliant with V2V Communication Standards
The development of quantum computing systems poses a great threat to the security of existing public key-based systems. As a result, the National Institute of Standards and Technology (NIST) started a Post-Quantum Cryptography (PQC) standardization ...
Youngbeom Kim, Seog Chung Seo
doaj +1 more source
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +2 more sources
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
Implementing Post-quantum Cryptography for Developers [PDF]
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and
Halunen, Kimmo +3 more
core +2 more sources
A Constant-time AVX2 Implementation of a Variant of ROLLO
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj +1 more source
Recent progress in the security evaluation of multivariate public‐key cryptography
Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field.
Yasuhiko Ikematsu +2 more
wiley +1 more source

