Results 1 to 10 of about 92,548 (300)
Post-Quantum Cryptography [PDF]
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, Daniel J., Lange, Tanja
core +9 more sources
Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl +3 more
doaj +2 more sources
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still less. Targeting
Yu-Long Gao +5 more
doaj +2 more sources
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara +3 more
doaj +2 more sources
Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks [PDF]
The Internet of Things (IoT) plays an essential role in people’s daily lives, such as healthcare, home, traffic, industry, and so on. With the increase in IoT devices, there emerge many security issues of data loss, privacy leakage, and information ...
Yang Zhang +4 more
doaj +2 more sources
Post-Quantum Security: Opportunities and Challenges [PDF]
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything
Silong Li +7 more
doaj +2 more sources
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei +4 more
doaj +2 more sources
Quantum secured blockchain framework for enhancing post quantum data security [PDF]
Quantum computing is an evolution of classical computing, capable of solving problems that are competitive enough to break the existing cryptographic primitives upon which current blockchain systems are based. Popular schemes like RSA, ECDSA, and SHA-256
Nalavala Ramanjaneya Reddy +5 more
doaj +2 more sources
How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj +1 more source
Blockchain technology affords data integrity protection and building trust mechanisms in transactions for distributed networks, and, therefore, is seen as a promising revolutionary information technology.
Ang Liu +7 more
doaj +1 more source

