Results 291 to 300 of about 24,566 (328)
Some of the next articles are maybe not open access.

Post-Quantum Cryptography

2020
For the last few chapters, we have kept a focus on quantum key distribution, or QKD. This maturing technology is still going to be relevant for a long time. What's going to come with it is known as post-quantum cryptography, which will be the main topic for this chapter.
Jonathan Katz, Yehuda Lindell
openaire   +3 more sources

Post-Quantum Cryptography

2019
The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and compatible with existing communication protocols and networks. Quantum computing is a winsome field that deals with theoretical computational systems combining visionary ideas of computer science, physics, and ...
Amandeep Singh Bhatia, Ashok Kumar
openaire   +2 more sources

Introduction to post-quantum cryptography [PDF]

open access: possible, 2009
Imagine that it’s fifteen years from now and someone announces the successful construction of a large quantum computer. The New York Times runs a frontpage article reporting that all of the public-key algorithms used to protect the Internet have been broken. Users panic. What exactly will happen to cryptography?
openaire   +2 more sources

The Need for Post-Quantum Cryptography

2021
This chapter provides some tactical and strategic solutions that cyber security professionals need to implement to mitigate and remediate the cyber risk from perceived data security threats from quantum computers. The tactical solutions would provide short term (1–4 year) coverage with quantum-resistant algorithms like AES, Diffie-Hillman (DH), ECDH ...
openaire   +2 more sources

Quantum Computer and Post-Quantum Cryptography

Programmnaya Ingeneria, 2021
An overview of the current state of the problem of building a quantum computer and its hypothetical use for breaking cryptographic protocols is presented. The necessary parameters are considered. An overview of existing quantum algorithms and post-quantum cryptographic protocols that are strong with respect to them is presented.
М. А. Cherepniov   +3 more
openaire   +1 more source

Post-quantum cryptography for automotive systems

Microprocessors and Microsystems, 2021
Abstract Automotive systems have become powerful computing platforms with an increasing demand for secure communication. The hyperconnectivity of the Vehicle-to-Everything (V2X) environment drastically increases the attack surface and the need for crypto-agility. In addition, the long lifecycle of automotive products demands that not only current but
Johanna Sepulveda   +4 more
openaire   +2 more sources

Post-Quantum Cryptography in MPSoC Environments

2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021
Multi-processors System-on-Chip (MPSoC) are a key enabling technology for different applications characterized by hyper-connectivity and multi-tenant requirements, where resources are shared and communication is ubiquitous. In such an environment, security plays a major role.
Mario Cupelli   +4 more
openaire   +2 more sources

A Panorama of Post-quantum Cryptography

2014
In 1994, Peter Shor published a quantum algorithm capable of factoring large integers and computing discrete logarithms in Abelian groups in polynomial time. Since these computational problems provide the security basis of conventional asymmetric cryptosystems (e.g., RSA, ECC), information encrypted under such schemes today may well become insecure in ...
Jefferson E. Ricardini   +7 more
openaire   +2 more sources

A Strategy Roadmap for Post-quantum Cryptography

2021
This work outlines a three-tier strategy for a European semiconductor vendor to align its internal R&D endeavors with National Institute of Standards and Technology (NIST)’s post-quantum cryptography (PQC) competition. We explore how a European semiconductor vendor is affected by a technological breakthrough in an adjacent technological field and ...
Tugrul U. Daim   +2 more
openaire   +2 more sources

Post-quantum Cryptography: An Introduction

2020
We present a brief introduction to post-quantum cryptography. This note introduces the concept of post-quantum cryptography, discusses its importance and provides a short overview of the mathematical techniques that are currently used to develop this field.
openaire   +2 more sources

Home - About - Disclaimer - Privacy