Results 1 to 10 of about 24,566 (328)
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq +6 more
doaj +2 more sources
Post–Quantum Cryptography – A Primer [PDF]
Traditionally, information security needed encryption, authentication, key management, non-repudiation and authorization which were being met using several techniques. Standardization of algorithms by National Institute of Standards and Technology (NIST) has facilitated international communication for banking and information transfer using these ...
P. V. Ananda Mohana
openalex +2 more sources
Implementing Post-quantum Cryptography for Developers [PDF]
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Julius Hekkala +3 more
openalex +8 more sources
I denne bacheloroppgaven, ser vi på CRYSTALS Kyber, en CCA2 kvante-resistante Key Encapsulation Mechanism, hvordan den er konstruert og dens sikkerhet. Vi kommer også til å se på Module Learning With Error Problemet. Det er en mulighet at kvantedatamaskiner en dag blir kraftige nok til å faktorisere heltall og finne løsninger til diskre logaritme ...
Jung Hee Cheon, Jean–Pierre Tillich
openalex +3 more sources
Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era [PDF]
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto +3 more
doaj +2 more sources
A Survey of Post-Quantum Cryptography: Start of a New Race [PDF]
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam +4 more
doaj +2 more sources
Post-Quantum Cryptography Neural Network [PDF]
In recent years, quantum computers and Shor quantum algorithm have posed a threat to current mainstream asymmetric cryptography methods (e.g. RSA and Elliptic Curve Cryptography (ECC)). Therefore, it is necessary to construct a Post-Quantum Cryptography (PQC) method to resist quantum computing attacks.
Abel C. H. Chen
openalex +3 more sources
Ramanujan Graphs for Post-Quantum Cryptography [PDF]
AbstractWe introduce a cryptographic hash function based on expander graphs, suggested by Charles et al. ’09, as one prominent candidate in post-quantum cryptography. We propose a generalized version of explicit constructions of Ramanujan graphs, which are seen as an optimal structure of expander graphs in a spectral sense, from the previous works of ...
Hyungrok Jo +2 more
openalex +2 more sources
A Mathematical Perspective on Post-Quantum Cryptography
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter +3 more
doaj +2 more sources
Evaluation of Post-Quantum Distributed Ledger Cryptography [PDF]
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (ECDSA) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as ...
Robert E. Campbell Sr.
doaj +3 more sources

