Results 51 to 60 of about 90,413 (378)

RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography

open access: yesIACR Cryptology ePrint Archive, 2020
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a challenging task. PQC introduces new mathematical elements and operations which are usually not easy to implement on standard processors.
Tim Fritzmann   +2 more
semanticscholar   +1 more source

Bitcoin Security with Post Quantum Cryptography [PDF]

open access: yes, 2019
In a future quantum world with a large quantum computer, the security of the digital signatures used for Bitcoin transactions will be broken by Shor's algorithm. Bitcoin has to switch to post-quantum cryptography. In this paper, we show that the post quantum signatures based on LWE and ring LWE are the most promising to use in the presence of large ...
Semmouni, Meryem,   +2 more
openaire   +3 more sources

Realization Scheme for Visual Cryptography with Computer-generated Holograms [PDF]

open access: yesarXiv, 2022
We propose to realize visual cryptography in an indirect way with the help of computer-generated hologram. At present, the recovery method of visual cryptography is mainly superimposed on transparent film or superimposed by computer equipment, which greatly limits the application range of visual cryptography.
arxiv  

Device-independent quantum key distribution from computational assumptions

open access: yesNew Journal of Physics, 2021
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of two components, distributed to Alice and Bob, who use the device to generate a secure key.
Tony Metger   +3 more
doaj   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Recent Advances in Post-Quantum Cryptography for Networks: A Survey

open access: yes2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ), 2022
The development of quantum computers poses a new security threat to network infrastructures and services, as they will be powerful enough to break the most common forms of digital encryption.
E. Zeydan   +3 more
semanticscholar   +1 more source

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

open access: yesEntropy, 2022
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang   +3 more
doaj   +1 more source

Quantum-Resistant Cryptography [PDF]

open access: yesarXiv, 2021
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
arxiv  

Code-based Post-Quantum Cryptography

open access: yes, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or in transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems based on modular arithmetic to the contemporary cryptosystems based on quantum computing.
Balamurugan, Chithralekha   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy