Results 11 to 20 of about 2,903 (146)
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
Blockchain technology ensures accountability, transparency, and redundancy, but its reliance on public‐key cryptography makes it vulnerable to quantum computing threats.
Dominik Marchsreiter
doaj +2 more sources
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +2 more sources
The Future of Cybersecurity in the Age of Quantum Computers
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj +1 more source
The advancement of quantum computing threatens the security of conventional public-key cryptosystems. Post-quantum cryptography (PQC) was introduced to ensure data confidentiality in communication channels, and various algorithms are being developed. The
Jihye Lee, Whijin Kim, Ji-Hoon Kim
doaj +1 more source
On new multivariate cryptosystems based on hidden Eulerian equations [PDF]
We propose new multivariate cryptosystems over an n-dimensional free module over the arithmetical ring Zm based on the idea of hidden discrete logarithm for Z*m. These cryptosystems are based on the hidden Eulerian equations.
Ustimenko, V.A.
core +1 more source
Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE).
Ardianto Satriawan +5 more
doaj +1 more source
High-Performance VLSI Architectures for Lattice-Based Cryptography [PDF]
Lattice-based cryptography is a cryptographic primitive built upon the hard problems on point lattices. Cryptosystems relying on lattice-based cryptography have attracted huge attention in the last decade since they have post-quantum-resistant security ...
Tan, Weihang
core +1 more source
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core

