Results 31 to 40 of about 89,748 (273)
Post-quantum cryptographic hardware primitives [PDF]
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi +3 more
core
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source
Quantum violations in the Instrumental scenario and their relations to the Bell scenario [PDF]
The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these
Brask, Jonatan Bohr +5 more
core +2 more sources
Efficient quantum key distribution secure against no-signalling eavesdroppers [PDF]
By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical "post-quantum" eavesdroppers limited by the ...
Acín A Gisin N Masanes L +9 more
core +2 more sources
Device-Independent Relativistic Quantum Bit Commitment [PDF]
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core +3 more sources
High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj +1 more source
Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto +3 more
doaj +1 more source
In this paper we present PQ-WireGuard, a post-quantum variant of the handshake in the WireGuard VPN protocol (NDSS 2017). Unlike most previous work on post-quantum security for real-world protocols, this variant does not only consider post-quantum confidentiality (or forward secrecy) but also post-quantum authentication. To achieve this, we replace the
Hulsing, Andreas +4 more
openaire +2 more sources
Hardy's nonlocality argument as witness for post-quantum correlation
Recently, Gallego et.al. [Phys. Rev. Lett 107, 210403 (2011)] proved that any future information principle aiming at distinguishing between quantum and post-quantum correlation must be intrinsically multipartite in nature.
Banik, Manik +4 more
core +1 more source

