Results 11 to 20 of about 90,413 (378)
Status report on the third round of the NIST post-quantum cryptography standardization process
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina+2 more
openalex +3 more sources
Implementing Post-quantum Cryptography for Developers [PDF]
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Julius Hekkala+3 more
openalex +4 more sources
Post-Quantum Security: Opportunities and Challenges [PDF]
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything
Silong Li+7 more
doaj +2 more sources
Post-quantum Cryptography in 6G [PDF]
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a contemporary computer, but which we can efficiently solve on a quantum one.
Partala, Juha
core +4 more sources
Post-quantum cryptography and the quantum future of cybersecurity. [PDF]
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Liu YK, Moody D.
europepmc +2 more sources
Quantum-Resistant TLS 1.3:A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography [PDF]
Hybrid authenticated key exchange combines cryptography key material from different sources (classical, quantum and post-quantum cryptography) to build protocols that are resilient to catastrophic failures, technology advances and future cryptanalytic ...
Aguilera, Abraham Cano+4 more
core +2 more sources
Post-quantum distributed ledger technology: a systematic survey [PDF]
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida+4 more
doaj +2 more sources
I denne bacheloroppgaven, ser vi på CRYSTALS Kyber, en CCA2 kvante-resistante Key Encapsulation Mechanism, hvordan den er konstruert og dens sikkerhet. Vi kommer også til å se på Module Learning With Error Problemet. Det er en mulighet at kvantedatamaskiner en dag blir kraftige nok til å faktorisere heltall og finne løsninger til diskre logaritme ...
Jung Hee Cheon, Jean–Pierre Tillich
openalex +3 more sources
Experimental authentication of quantum key distribution with post-quantum cryptography [PDF]
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang+11 more
doaj +2 more sources
DAGS: Key encapsulation using dyadic GS codes [PDF]
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo+12 more
doaj +6 more sources