Results 11 to 20 of about 90,413 (378)

Status report on the third round of the NIST post-quantum cryptography standardization process

open access: goldRadiotekhnika, 2022
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina   +2 more
openalex   +3 more sources

Implementing Post-quantum Cryptography for Developers [PDF]

open access: hybridSN Computer Science, 2023
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Julius Hekkala   +3 more
openalex   +4 more sources

Post-Quantum Security: Opportunities and Challenges [PDF]

open access: yesSensors, 2023
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything
Silong Li   +7 more
doaj   +2 more sources

Post-quantum Cryptography in 6G [PDF]

open access: yes, 2022
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a contemporary computer, but which we can efficiently solve on a quantum one.
Partala, Juha
core   +4 more sources

Post-quantum cryptography and the quantum future of cybersecurity. [PDF]

open access: yesPhys Rev Appl
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Liu YK, Moody D.
europepmc   +2 more sources

Quantum-Resistant TLS 1.3:A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography [PDF]

open access: yesIEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2023
Hybrid authenticated key exchange combines cryptography key material from different sources (classical, quantum and post-quantum cryptography) to build protocols that are resilient to catastrophic failures, technology advances and future cryptanalytic ...
Aguilera, Abraham Cano   +4 more
core   +2 more sources

Post-quantum distributed ledger technology: a systematic survey [PDF]

open access: yesScientific Reports, 2023
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida   +4 more
doaj   +2 more sources

Post-Quantum Cryptography

open access: green, 2021
I denne bacheloroppgaven, ser vi på CRYSTALS Kyber, en CCA2 kvante-resistante Key Encapsulation Mechanism, hvordan den er konstruert og dens sikkerhet. Vi kommer også til å se på Module Learning With Error Problemet. Det er en mulighet at kvantedatamaskiner en dag blir kraftige nok til å faktorisere heltall og finne løsninger til diskre logaritme ...
Jung Hee Cheon, Jean–Pierre Tillich
openalex   +3 more sources

Experimental authentication of quantum key distribution with post-quantum cryptography [PDF]

open access: goldnpj Quantum Information, 2021
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang   +11 more
doaj   +2 more sources

DAGS: Key encapsulation using dyadic GS codes [PDF]

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +6 more sources

Home - About - Disclaimer - Privacy