Results 261 to 270 of about 2,059,050 (339)
Some of the next articles are maybe not open access.

FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks

Design Automation Conference, 2021
This paper proposes the first side-channel attack on FALCON—a NIST Round-3 finalist for the post-quantum digital signature standard. We demonstrate a known-plaintext attack that uses the electromagnetic measurements of the device to extract the secret ...
Emre Karabulut, Aydin Aysu
semanticscholar   +1 more source

An Area-Efficient SPHINCS+ Post-Quantum Signature Coprocessor

IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, 2021
The significant advances in the area of quantum computing of the past decade leave no doubt about the fact that quantum computers are an actual threat to cryptography.
Quentin Berthet   +4 more
semanticscholar   +1 more source

Arbitrated quantum signature protocol with boson sampling-based random unitary encryption

Journal of Physics A: Mathematical and Theoretical, 2020
For signing quantum messages, the arbitrated quantum signature (AQS) has been widely investigated to date. However, most of the existing AQS protocols are susceptible to different aspects of disavowal and forgery attacks due to the use of quantum one ...
Yanyan Feng   +5 more
semanticscholar   +1 more source

Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS

IEEE Transactions on Parallel and Distributed Systems, 2020
SPHINCS was recently proposed as a stateless, quantum-resilient hash-based signature scheme. However, one possible limitation of SPHINCS is its signing speed, namely, the best known implementation merely produces a few hundred of signatures per second ...
Shuzhou Sun, Rui Zhang, Hui Ma
semanticscholar   +1 more source

Blind Quantum Signature with Blind Quantum Computation

International Journal of Theoretical Physics, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Wei, Shi, Ronghua, Guo, Ying
openaire   +1 more source

Quantum homomorphic signature

Quantum Information Processing, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shang, Tao   +3 more
openaire   +2 more sources

Quantum Signature of Superfluid Turbulence

Physical Review Letters, 2001
Physical Review ...
Kivotides D   +4 more
openaire   +3 more sources

On the Suitability of Post-Quantum Signature Schemes for Internet of Things

IEEE Internet of Things Journal
Public-key cryptography (PKC) provides confidentiality, data integrity, and user authentication. Particularly, nonrepudiation, authentication and integrity of transmitted messages are assured by public-key (PK) signature schemes.
Kyung-Ah Shim
semanticscholar   +1 more source

Arbitration quantum signature protocol based on XOR encryption

, 2020
The invention discloses an arbitration quantum signature method based on XOR encryption. The method comprises a signer Alice, a receiver Bob, an arbiter Trent and a three-particle GHZ state quantum key shared by the three parties, the three-particle GHZ ...
Xiao-yi Zheng, Chang Kuang
semanticscholar   +1 more source

Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium

IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2023
The looming threat of an adversary with quantum computing capability led to a worldwide research effort towards identifying and standardizing novel post-quantum cryptographic primitives.
Naina Gupta   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy