Results 1 to 10 of about 92,548 (300)

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, Daniel J., Lange, Tanja
core   +9 more sources

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: greenIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +2 more sources

A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain

open access: goldIEEE Access, 2018
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still less. Targeting
Yu-Long Gao   +5 more
doaj   +2 more sources

A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]

open access: yesSensors
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara   +3 more
doaj   +2 more sources

Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks [PDF]

open access: yesSensors
The Internet of Things (IoT) plays an essential role in people’s daily lives, such as healthcare, home, traffic, industry, and so on. With the increase in IoT devices, there emerge many security issues of data loss, privacy leakage, and information ...
Yang Zhang   +4 more
doaj   +2 more sources

Post-Quantum Security: Opportunities and Challenges [PDF]

open access: yesSensors, 2023
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything
Silong Li   +7 more
doaj   +2 more sources

Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]

open access: yesSensors
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei   +4 more
doaj   +2 more sources

Quantum secured blockchain framework for enhancing post quantum data security [PDF]

open access: yesScientific Reports
Quantum computing is an evolution of classical computing, capable of solving problems that are competitive enough to break the existing cryptographic primitives upon which current blockchain systems are based. Popular schemes like RSA, ECDSA, and SHA-256
Nalavala Ramanjaneya Reddy   +5 more
doaj   +2 more sources

How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj   +1 more source

A Secure Scheme Based on a Hybrid of Classical-Quantum Communications Protocols for Managing Classical Blockchains

open access: yesEntropy, 2023
Blockchain technology affords data integrity protection and building trust mechanisms in transactions for distributed networks, and, therefore, is seen as a promising revolutionary information technology.
Ang Liu   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy