Results 291 to 300 of about 24,566 (328)
Some of the next articles are maybe not open access.
2020
For the last few chapters, we have kept a focus on quantum key distribution, or QKD. This maturing technology is still going to be relevant for a long time. What's going to come with it is known as post-quantum cryptography, which will be the main topic for this chapter.
Jonathan Katz, Yehuda Lindell
openaire +3 more sources
For the last few chapters, we have kept a focus on quantum key distribution, or QKD. This maturing technology is still going to be relevant for a long time. What's going to come with it is known as post-quantum cryptography, which will be the main topic for this chapter.
Jonathan Katz, Yehuda Lindell
openaire +3 more sources
2019
The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and compatible with existing communication protocols and networks. Quantum computing is a winsome field that deals with theoretical computational systems combining visionary ideas of computer science, physics, and ...
Amandeep Singh Bhatia, Ashok Kumar
openaire +2 more sources
The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and compatible with existing communication protocols and networks. Quantum computing is a winsome field that deals with theoretical computational systems combining visionary ideas of computer science, physics, and ...
Amandeep Singh Bhatia, Ashok Kumar
openaire +2 more sources
Introduction to post-quantum cryptography [PDF]
Imagine that it’s fifteen years from now and someone announces the successful construction of a large quantum computer. The New York Times runs a frontpage article reporting that all of the public-key algorithms used to protect the Internet have been broken. Users panic. What exactly will happen to cryptography?
openaire +2 more sources
The Need for Post-Quantum Cryptography
2021This chapter provides some tactical and strategic solutions that cyber security professionals need to implement to mitigate and remediate the cyber risk from perceived data security threats from quantum computers. The tactical solutions would provide short term (1–4 year) coverage with quantum-resistant algorithms like AES, Diffie-Hillman (DH), ECDH ...
openaire +2 more sources
Quantum Computer and Post-Quantum Cryptography
Programmnaya Ingeneria, 2021An overview of the current state of the problem of building a quantum computer and its hypothetical use for breaking cryptographic protocols is presented. The necessary parameters are considered. An overview of existing quantum algorithms and post-quantum cryptographic protocols that are strong with respect to them is presented.
М. А. Cherepniov +3 more
openaire +1 more source
Post-quantum cryptography for automotive systems
Microprocessors and Microsystems, 2021Abstract Automotive systems have become powerful computing platforms with an increasing demand for secure communication. The hyperconnectivity of the Vehicle-to-Everything (V2X) environment drastically increases the attack surface and the need for crypto-agility. In addition, the long lifecycle of automotive products demands that not only current but
Johanna Sepulveda +4 more
openaire +2 more sources
Post-Quantum Cryptography in MPSoC Environments
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021Multi-processors System-on-Chip (MPSoC) are a key enabling technology for different applications characterized by hyper-connectivity and multi-tenant requirements, where resources are shared and communication is ubiquitous. In such an environment, security plays a major role.
Mario Cupelli +4 more
openaire +2 more sources
A Panorama of Post-quantum Cryptography
2014In 1994, Peter Shor published a quantum algorithm capable of factoring large integers and computing discrete logarithms in Abelian groups in polynomial time. Since these computational problems provide the security basis of conventional asymmetric cryptosystems (e.g., RSA, ECC), information encrypted under such schemes today may well become insecure in ...
Jefferson E. Ricardini +7 more
openaire +2 more sources
A Strategy Roadmap for Post-quantum Cryptography
2021This work outlines a three-tier strategy for a European semiconductor vendor to align its internal R&D endeavors with National Institute of Standards and Technology (NIST)’s post-quantum cryptography (PQC) competition. We explore how a European semiconductor vendor is affected by a technological breakthrough in an adjacent technological field and ...
Tugrul U. Daim +2 more
openaire +2 more sources
Post-quantum Cryptography: An Introduction
2020We present a brief introduction to post-quantum cryptography. This note introduces the concept of post-quantum cryptography, discusses its importance and provides a short overview of the mathematical techniques that are currently used to develop this field.
openaire +2 more sources

