Results 41 to 50 of about 24,566 (328)

Applications of Post-Quantum Cryptography

open access: yesEuropean Conference on Cyber Warfare and Security
With the constantly advancing capabilities of quantum computers, conventional cryptographic systems relying on complex math problems may encounter unforeseen vulnerabilities. Unlike regular computers, which are often deemed cost-ineffective in cryptographic attacks, quantum computers have a significant advantage in calculation speed.
Emils Bagirovs   +3 more
openaire   +2 more sources

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Unconditional security at a low cost [PDF]

open access: yes, 2006
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett   +9 more
core   +3 more sources

Code-based Post-Quantum Cryptography

open access: yes, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or in transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems based on modular arithmetic to the contemporary cryptosystems based on quantum computing.
Balamurugan, Chithralekha   +3 more
openaire   +2 more sources

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

open access: yesApplied Sciences
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim   +4 more
doaj   +1 more source

Device-independent quantum key distribution from computational assumptions

open access: yesNew Journal of Physics, 2021
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of two components, distributed to Alice and Bob, who use the device to generate a secure key.
Tony Metger   +3 more
doaj   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Bitcoin Security with Post Quantum Cryptography [PDF]

open access: yes, 2019
In a future quantum world with a large quantum computer, the security of the digital signatures used for Bitcoin transactions will be broken by Shor's algorithm. Bitcoin has to switch to post-quantum cryptography. In this paper, we show that the post quantum signatures based on LWE and ring LWE are the most promising to use in the presence of large ...
Abderrahmane Nitaj   +2 more
openaire   +2 more sources

Post-Quantum Cryptography: S [PDF]

open access: yes, 2017
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor's polynomial time algorithm for numerical field problems like integer ...
Hecht, P. (P)
core  

Post Quantum Cryptography from Mutant Prime Knots

open access: yes, 2010
By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the `difficulty' of decomposing complex knots generated as connected sums of prime knots and their mutants.
Adams C.   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy