Results 301 to 310 of about 24,566 (328)
Some of the next articles are maybe not open access.

Post-Quantum Cryptography in Embedded Systems

Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Quantum computers that can run Shor's algorithm are expected to become available in the next decade. These algorithms can be used to break conventional digital signature schemes (e.g. RSA or ECDSA), which are widely used in embedded systems today. This puts these systems at risk when they are used in safety-relevant long-term applications such as ...
Soundes Marzougui, Juliane Krämer
openaire   +2 more sources

Post-Quantum Cryptography in WireGuard VPN

2020
WireGuard is a new and promising VPN software. It relies on ECDH for the key agreement and server authentication. This makes the tunnel vulnerable to future attacks with quantum computers.
Wolf Müller   +2 more
openaire   +2 more sources

Cryptography in a post-quantum world

Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Lattice-based hard problems are a leading candidate for implementation in future public key cryptographic schemes due to their conjectured quantum resilience. Lattice-based problems offer certain advantages over non-lattice-based cryptosystems, such as a relatively short key length [3] and versatility, since lattice cryptosystems can offer both ...
openaire   +1 more source

Post-quantum cryptography: lattice signatures

Computing, 2009
This survey provides a comparative overview of lattice-based signature schemes with respect to security and performance. Furthermore, we explicitly show how to construct a competitive and provably secure Merkle tree signature scheme solely based on worst-case lattice problems.
Richard Lindner   +3 more
openaire   +2 more sources

Benchmarking Post-quantum Cryptography in TLS

2020
Post-quantum cryptographic primitives have a range of trade-offs compared to traditional public key algorithms, either having slower computation or larger public keys and ciphertexts/signatures, or both. While the performance of these algorithms in isolation is easy to measure and has been a focus of optimization techniques, performance in realistic ...
Christian Paquin   +2 more
openaire   +2 more sources

Post-Quantum Cryptography and Quantum Cloning

2020
In the last two decades, the field of post-quantum cryptography has had an overwhelming response among research communities. The ability of quantum computers to factorize large numbers could break many of well-known RSA cryptosystem and discrete log-based cryptosystem.
Amandeep Singh Bhatia, Shenggen Zheng
openaire   +1 more source

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Entanglement-based secure quantum cryptography over 1,120 kilometres

Nature, 2020
Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly  

Home - About - Disclaimer - Privacy