Results 11 to 20 of about 1,873 (168)

First end-to-end PQC protected DPU-to-DPU communications [PDF]

open access: yesElectronics Letters, Volume 59, Issue 17, September 2023., 2023
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real-time communications.
Aguilera, A. Cano   +4 more
core   +4 more sources

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain
Blockchain technology ensures accountability, transparency, and redundancy, but its reliance on public‐key cryptography makes it vulnerable to quantum computing threats.
Dominik Marchsreiter
doaj   +2 more sources

Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms

open access: yesIEEE Access, 2021
Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes on a conventional ...
Crystal Andrea Roma   +2 more
doaj   +1 more source

Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms

open access: yesMathematics, 2022
Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call in the category of public key encryption schemes.
Miguel Ángel González de la Torre   +2 more
doaj   +1 more source

Signature Split Method for a PQC-DSA Compliant with V2V Communication Standards

open access: yesApplied Sciences, 2023
The development of quantum computing systems poses a great threat to the security of existing public key-based systems. As a result, the National Institute of Standards and Technology (NIST) started a Post-Quantum Cryptography (PQC) standardization ...
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Implementing Post-quantum Cryptography for Developers [PDF]

open access: yes, 2023
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and
Halunen, Kimmo   +3 more
core   +2 more sources

A Constant-time AVX2 Implementation of a Variant of ROLLO

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj   +1 more source

Recent progress in the security evaluation of multivariate public‐key cryptography

open access: yesIET Information Security, Volume 17, Issue 2, Page 210-226, March 2023., 2023
Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field.
Yasuhiko Ikematsu   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy