Results 41 to 50 of about 90,413 (378)
Optimized Implementation and Analysis of CHAM in Quantum Computing
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang+3 more
doaj +1 more source
A Design of Secure Communication Architecture Applying Quantum Cryptography
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim+2 more
doaj +1 more source
QKD-Enhanced Cybersecurity Protocols
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography
Ivan B. Djordjevic
doaj +1 more source
Implementing Post-quantum Cryptography for Developers
The possibility of a quantum computer threatens modern public key cryptography. Post-quantum cryptographic algorithms are designed to protect sensitive data and communications also against an attacker equipped with a quantum computer. National Institute of Standards and Technology is standardizing post-quantum algorithms that could replace currently ...
Hekkala, Julius+2 more
openaire +2 more sources
The Mathematical Foundation of Post-Quantum Cryptography
On July 5, 2022, the National Institute of Standards and Technology announced four possible post-quantum cryptography standards, three of them are based on lattice theory and the other one is based on Hash function.
Zong, Chuanming
core +2 more sources
Lattice‐based cryptosystems in standardisation processes: A survey
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj +1 more source
NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song+4 more
doaj +1 more source
FPGA implementation of post-quantum DME cryptosystem [PDF]
The rapid development of quantum computing constitutes a significant threat to modern Public-Key Cryptography (PKC). The use of Shor's algorithm with potential powerful quantum computers could easily break the two most widely used public key ...
Imaña Pascual, José Luis+1 more
core +2 more sources
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann+6 more
semanticscholar +1 more source
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei+5 more
semanticscholar +1 more source