Results 261 to 270 of about 2,059,050 (339)
Some of the next articles are maybe not open access.
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
Design Automation Conference, 2021This paper proposes the first side-channel attack on FALCON—a NIST Round-3 finalist for the post-quantum digital signature standard. We demonstrate a known-plaintext attack that uses the electromagnetic measurements of the device to extract the secret ...
Emre Karabulut, Aydin Aysu
semanticscholar +1 more source
An Area-Efficient SPHINCS+ Post-Quantum Signature Coprocessor
IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, 2021The significant advances in the area of quantum computing of the past decade leave no doubt about the fact that quantum computers are an actual threat to cryptography.
Quentin Berthet +4 more
semanticscholar +1 more source
Arbitrated quantum signature protocol with boson sampling-based random unitary encryption
Journal of Physics A: Mathematical and Theoretical, 2020For signing quantum messages, the arbitrated quantum signature (AQS) has been widely investigated to date. However, most of the existing AQS protocols are susceptible to different aspects of disavowal and forgery attacks due to the use of quantum one ...
Yanyan Feng +5 more
semanticscholar +1 more source
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS
IEEE Transactions on Parallel and Distributed Systems, 2020SPHINCS was recently proposed as a stateless, quantum-resilient hash-based signature scheme. However, one possible limitation of SPHINCS is its signing speed, namely, the best known implementation merely produces a few hundred of signatures per second ...
Shuzhou Sun, Rui Zhang, Hui Ma
semanticscholar +1 more source
Blind Quantum Signature with Blind Quantum Computation
International Journal of Theoretical Physics, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Wei, Shi, Ronghua, Guo, Ying
openaire +1 more source
Quantum Information Processing, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shang, Tao +3 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shang, Tao +3 more
openaire +2 more sources
Quantum Signature of Superfluid Turbulence
Physical Review Letters, 2001Physical Review ...
Kivotides D +4 more
openaire +3 more sources
On the Suitability of Post-Quantum Signature Schemes for Internet of Things
IEEE Internet of Things JournalPublic-key cryptography (PKC) provides confidentiality, data integrity, and user authentication. Particularly, nonrepudiation, authentication and integrity of transmitted messages are assured by public-key (PK) signature schemes.
Kyung-Ah Shim
semanticscholar +1 more source
Arbitration quantum signature protocol based on XOR encryption
, 2020The invention discloses an arbitration quantum signature method based on XOR encryption. The method comprises a signer Alice, a receiver Bob, an arbiter Trent and a three-particle GHZ state quantum key shared by the three parties, the three-particle GHZ ...
Xiao-yi Zheng, Chang Kuang
semanticscholar +1 more source
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium
IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2023The looming threat of an adversary with quantum computing capability led to a worldwide research effort towards identifying and standardizing novel post-quantum cryptographic primitives.
Naina Gupta +3 more
semanticscholar +1 more source

