Results 81 to 90 of about 5,946 (156)

A new non-commutative key exchange protocol on combinatorial semigroup

open access: yesAutomatika
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj   +1 more source

Cryptanalysis of some protocols using matrices over group rings

open access: yes, 2015
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring.
Eftekhari, Mohammad
core  

A Quantum Differential Attack on ChaCha and Related Resources Estimation

open access: yesIEEE Access
Existing classical cryptanalytic techniques against ChaCha primarily rely on differential cryptanalysis, leveraging probabilistic neutral bits (PNBs) introduced by Aumasson et al. Separately, Bathe et al.
Mintu Mandal   +2 more
doaj   +1 more source

Quantum Attacks on MIBS Block Cipher Based on Bernstein–Vazirani Algorithm

open access: yesMathematics
Because of the substantial progress in quantum computing technology, the safety of traditional cryptologic schemes is facing serious challenges. In this study, we explore the quantum safety of the lightweight cipher MIBS and propose quantum key-recovery ...
Huiqin Xie   +4 more
doaj   +1 more source

HHL Algorithm for Tensor-Decomposable Matrices

open access: yesQuantum Reports
We use the HHL algorithm to retrieve a quantum state holding the algebraic normal form (ANF) of a Boolean function. Unlike the standard HHL applications, we do not describe the cipher as an exponentially big system of equations.
Cezary Pilaszewicz, Marian Margraf
doaj   +1 more source

An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis

open access: yesQuantum Reports
In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers.
Christoph Graebnitz   +5 more
doaj   +1 more source

Quantum e-commerce: A comparative study of possible protocols for online shopping and other tasks related to e-commerce

open access: yes, 2018
A set of quantum protocols for online shopping is proposed and analyzed to establish that it is possible to perform secure online shopping using different types of quantum resources. Specifically, a single photon based, a Bell state based and two 3-qubit
Pathak, Anirban, Thapliyal, Kishore
core  

Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256

open access: yesIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum collision attacks on hash functions. Their proposal presented a quantum adaptation of the rebound attack and revealed that differential trails, which have too low probability ...
Dongjae Lee, Seokhie Hong
doaj   +1 more source

Prospects for Legal Regulation of Quantum Communication

open access: yesBRICS Law Journal
The leading countries across the world have entered the race to develop quantum technologies that will enable them to ensure their continued economic prosperity.
A. Minbaleev, S. Zenin, K. Evsikov
doaj   +1 more source

Cryptographic Protection for Military Radio Communications [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
Robert Białas   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy