Results 21 to 30 of about 25,460 (262)

Gaussian Post-selection for Continuous Variable Quantum Cryptography [PDF]

open access: yes, 2012
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdropping attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a ...
F. Grosshans   +5 more
core   +2 more sources

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems [PDF]

open access: yesITM Web of Conferences
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks.
Kumar Bathala Naresh   +5 more
doaj   +1 more source

Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era

open access: yesIEEE Access, 2023
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto   +3 more
doaj   +1 more source

Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense [PDF]

open access: yes, 2016
We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in ...
Filip, Radim, Usenko, Vladyslav C.
core   +5 more sources

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Random Oracles in a Quantum World [PDF]

open access: yes, 2011
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett   +25 more
core   +3 more sources

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

Evaluation of Post-Quantum Distributed Ledger Cryptography

open access: yesThe Journal of The British Blockchain Association, 2019
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj   +2 more sources

HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

open access: yesEngineering Science and Technology, an International Journal, 2022
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj   +1 more source

Home - About - Disclaimer - Privacy