Results 31 to 40 of about 92,548 (300)
Efficient quantum key distribution secure against no-signalling eavesdroppers [PDF]
By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical "post-quantum" eavesdroppers limited by the ...
Acín A Gisin N Masanes L +9 more
core +2 more sources
Post-quantum cryptographic hardware primitives [PDF]
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi +3 more
core
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source
A framework for cryptographic problems from linear algebra
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl +3 more
doaj +1 more source
Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto +3 more
doaj +1 more source
Device-Independent Relativistic Quantum Bit Commitment [PDF]
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core +3 more sources
An Efficient Strong Designated Verifier Signature Based on
The designated verifier signature (DVS), introduced by Jakobsson et al., has the property that only the designated verifier can verify the generated signature.
Jie Cai +5 more
doaj +1 more source
In this paper we present PQ-WireGuard, a post-quantum variant of the handshake in the WireGuard VPN protocol (NDSS 2017). Unlike most previous work on post-quantum security for real-world protocols, this variant does not only consider post-quantum confidentiality (or forward secrecy) but also post-quantum authentication. To achieve this, we replace the
Hulsing, Andreas +4 more
openaire +2 more sources
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is
openaire +1 more source
Probing wave function collapse models with a classically driven mechanical oscillator [PDF]
We show that the interaction of a pulsed laser light with a mechanical oscillator through the radiation pressure results in an opto-mechanical entangled state in which the photon number is correlated with the oscillator position.
Ho, Melvyn +3 more
core +2 more sources

