Results 31 to 40 of about 89,748 (273)

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Quantum violations in the Instrumental scenario and their relations to the Bell scenario [PDF]

open access: yes, 2019
The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these
Brask, Jonatan Bohr   +5 more
core   +2 more sources

Efficient quantum key distribution secure against no-signalling eavesdroppers [PDF]

open access: yes, 2006
By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical "post-quantum" eavesdroppers limited by the ...
Acín A Gisin N Masanes L   +9 more
core   +2 more sources

Device-Independent Relativistic Quantum Bit Commitment [PDF]

open access: yes, 2015
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core   +3 more sources

High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

open access: yesIEEE Access, 2019
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj   +1 more source

Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era

open access: yesIEEE Access, 2023
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto   +3 more
doaj   +1 more source

Post-quantum WireGuard

open access: yes2021 IEEE Symposium on Security and Privacy (SP), 2021
In this paper we present PQ-WireGuard, a post-quantum variant of the handshake in the WireGuard VPN protocol (NDSS 2017). Unlike most previous work on post-quantum security for real-world protocols, this variant does not only consider post-quantum confidentiality (or forward secrecy) but also post-quantum authentication. To achieve this, we replace the
Hulsing, Andreas   +4 more
openaire   +2 more sources

Hardy's nonlocality argument as witness for post-quantum correlation

open access: yes, 2012
Recently, Gallego et.al. [Phys. Rev. Lett 107, 210403 (2011)] proved that any future information principle aiming at distinguishing between quantum and post-quantum correlation must be intrinsically multipartite in nature.
Banik, Manik   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy