Results 31 to 40 of about 92,548 (300)

Efficient quantum key distribution secure against no-signalling eavesdroppers [PDF]

open access: yes, 2006
By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical "post-quantum" eavesdroppers limited by the ...
Acín A Gisin N Masanes L   +9 more
core   +2 more sources

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

A framework for cryptographic problems from linear algebra

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl   +3 more
doaj   +1 more source

Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era

open access: yesIEEE Access, 2023
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto   +3 more
doaj   +1 more source

Device-Independent Relativistic Quantum Bit Commitment [PDF]

open access: yes, 2015
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core   +3 more sources

An Efficient Strong Designated Verifier Signature Based on $\mathcal{R}-$ SIS Assumption

open access: yesIEEE Access, 2019
The designated verifier signature (DVS), introduced by Jakobsson et al., has the property that only the designated verifier can verify the generated signature.
Jie Cai   +5 more
doaj   +1 more source

Post-quantum WireGuard

open access: yes2021 IEEE Symposium on Security and Privacy (SP), 2021
In this paper we present PQ-WireGuard, a post-quantum variant of the handshake in the WireGuard VPN protocol (NDSS 2017). Unlike most previous work on post-quantum security for real-world protocols, this variant does not only consider post-quantum confidentiality (or forward secrecy) but also post-quantum authentication. To achieve this, we replace the
Hulsing, Andreas   +4 more
openaire   +2 more sources

Post-Quantum Cryptography

open access: yesARIS2 - Advanced Research on Information Systems Security, 2022
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is
openaire   +1 more source

Probing wave function collapse models with a classically driven mechanical oscillator [PDF]

open access: yes, 2016
We show that the interaction of a pulsed laser light with a mechanical oscillator through the radiation pressure results in an opto-mechanical entangled state in which the photon number is correlated with the oscillator position.
Ho, Melvyn   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy