Results 21 to 30 of about 5,946 (156)

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Quantum cryptanalysis of lightweight block cipher Piccolo

open access: yesTongxin xuebao, 2023
By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results ...
Xiaoni DU   +3 more
doaj   +2 more sources

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

open access: yesCryptography, 2018
The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all ...
Jani Suomalainen   +3 more
doaj   +1 more source

A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme

open access: yesJournal of Mathematical Cryptology, 2022
In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of ...
Sharafi Javad, Daghigh Hassan
doaj   +1 more source

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Quantum key recovery attack on SIMON32/64

open access: yesCybersecurity, 2021
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while the quantum attacks combined with classical ...
Hui Liu, Li Yang
doaj   +1 more source

Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems [PDF]

open access: yesQuantum, 2023
Recently Chen and Gao \cite{ChenGao2017} proposed a new quantum algorithm for Boolean polynomial system solving, motivated by the cryptanalysis of some post-quantum cryptosystems.
Jintai Ding   +4 more
doaj   +1 more source

Quantum Automated Tools for Finding Impossible Differentials

open access: yesMathematics
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie   +4 more
doaj   +1 more source

Quantum Period Finding against Symmetric Primitives in Practice

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, and estimate their cost to attack the MAC Chaskey, the block cipher PRINCE and the NIST lightweight finalist AEAD scheme Elephant.
Xavier Bonnetain, Samuel Jaques
doaj   +1 more source

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

Home - About - Disclaimer - Privacy