Results 11 to 20 of about 36,975 (185)

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +1 more source

Status report on the third round of the NIST post-quantum cryptography standardization process

open access: yesRadiotekhnika, 2022
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina   +2 more
semanticscholar   +1 more source

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

Post-Quantum Cryptography

open access: yes, 2021
This study provides an overview of the current state of affairs on the standardization process of Post-Quantum Cryptography (PQC). It presents the 5 main families of PQ algorithms; viz. code-based, isogeny-based, hash-based, lattice-based and multivariate-based.
Beullens, Ward   +6 more
  +7 more sources

A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions

open access: yesShifra, 2023
As quantum computing technology evolves, it poses greater risks to current cryptography schemes such as RSA and Elliptic Curve Cryptography (ECC), widely used to secure digital communications These classical algorithms are based on mathematical problems
Swapnali N Tambe-Jagtap
doaj   +1 more source

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

Post-Quantum Security: Opportunities and Challenges

open access: yesSensors, 2023
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything
Silong Li   +7 more
doaj   +1 more source

A Design of Secure Communication Architecture Applying Quantum Cryptography

open access: yesJournal of Information Science Theory and Practice, 2022
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim   +2 more
doaj   +1 more source

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Post-Quantum Cryptography

open access: yesCommunications of the ACM, 2023
Cryptographers seek algorithms quantum computers cannot break.
  +4 more sources

Home - About - Disclaimer - Privacy