Results 81 to 90 of about 36,975 (185)

Lightweight ASIP Design for Lattice-Based Post-quantum Cryptography Algorithms

open access: yesThe Arabian journal for science and engineering
Lattice-based cryptography (LBC) algorithms are considered suitable candidates for post-quantum cryptography (PQC), as they dominate the standardization process put forward by the National Institute of Standards and Technology (NIST).
Latif Akçay, B. Yalçin
semanticscholar   +1 more source

A survey on lattice-based digital signature

open access: yesCybersecurity
Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an important tool for constructing cryptography ...
Fengxia Liu   +7 more
doaj   +1 more source

From Policy to Practice: A Sector-Agnostic Operational Framework for Post-Quantum Cryptography Transition

open access: yesIEEE Access
The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process.
Berat Birgin, Baris Celiktas
doaj   +1 more source

Ligthweight + post-quantum cryptographies

open access: yes, 2021
O objectivo do trabalho proposto passa por analisar a viabilidade de esquemas de assinatura digital “low-algebra” derivados de um dos algoritmos SPHINCS+ ou PICNIC recorrendo cada um a primitivas LWC das famílias ASCON e SKINNY. Para esse efeito comerçar-se-á por implementar cada um desses algoritmos em C seguindo-se uma seleção de quais as variáveis ...
openaire   +1 more source

Secure edge-based IoMT framework for ICU monitoring with TinyML and post-quantum cryptography. [PDF]

open access: yesSci Rep
Khan UH   +5 more
europepmc   +1 more source

Post Quantum Cryptography Explained

open access: yesITNOW
Abstract Professor Bill Buchanan OBE FRSE considers the impact of advancements in quantum computing on cryptography and explores the methods available for safeguarding data.
openaire   +1 more source

Home - About - Disclaimer - Privacy