Results 1 to 10 of about 24,566 (328)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]

open access: yesSensors, 2023
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq   +6 more
doaj   +2 more sources

Post–Quantum Cryptography – A Primer [PDF]

open access: bronzeAdvanced Computing and Communications, 2020
Traditionally, information security needed encryption, authentication, key management, non-repudiation and authorization which were being met using several techniques. Standardization of algorithms by National Institute of Standards and Technology (NIST) has facilitated international communication for banking and information transfer using these ...
P. V. Ananda Mohana
openalex   +2 more sources

Implementing Post-quantum Cryptography for Developers [PDF]

open access: hybridSN Computer Science, 2023
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Julius Hekkala   +3 more
openalex   +8 more sources

Post-Quantum Cryptography

open access: green, 2021
I denne bacheloroppgaven, ser vi på CRYSTALS Kyber, en CCA2 kvante-resistante Key Encapsulation Mechanism, hvordan den er konstruert og dens sikkerhet. Vi kommer også til å se på Module Learning With Error Problemet. Det er en mulighet at kvantedatamaskiner en dag blir kraftige nok til å faktorisere heltall og finne løsninger til diskre logaritme ...
Jung Hee Cheon, Jean–Pierre Tillich
openalex   +3 more sources

Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era [PDF]

open access: goldIEEE Access, 2023
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto   +3 more
doaj   +2 more sources

A Survey of Post-Quantum Cryptography: Start of a New Race [PDF]

open access: goldCryptography, 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
doaj   +2 more sources

Post-Quantum Cryptography Neural Network [PDF]

open access: green2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023
In recent years, quantum computers and Shor quantum algorithm have posed a threat to current mainstream asymmetric cryptography methods (e.g. RSA and Elliptic Curve Cryptography (ECC)). Therefore, it is necessary to construct a Post-Quantum Cryptography (PQC) method to resist quantum computing attacks.
Abel C. H. Chen
openalex   +3 more sources

Ramanujan Graphs for Post-Quantum Cryptography [PDF]

open access: hybrid, 2020
AbstractWe introduce a cryptographic hash function based on expander graphs, suggested by Charles et al. ’09, as one prominent candidate in post-quantum cryptography. We propose a generalized version of explicit constructions of Ramanujan graphs, which are seen as an optimal structure of expander graphs in a spectral sense, from the previous works of ...
Hyungrok Jo   +2 more
openalex   +2 more sources

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +2 more sources

Evaluation of Post-Quantum Distributed Ledger Cryptography [PDF]

open access: yesThe Journal of The British Blockchain Association, 2019
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (ECDSA) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as ...
Robert E. Campbell Sr.
doaj   +3 more sources

Home - About - Disclaimer - Privacy