Zobrazeno 1 - 10
of 3 945
pro vyhledávání: '"Post Quantum Cryptography"'
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 4, Pp 99-108 (2024)
Since the discovery of the Shor quantum algorithm, capable of solving factorization and discrete logarithm problems in polynomial time, post-quantum cryptographic algorithms have been actively developed. Although some of the post-quantum algorithms h
Externí odkaz:
https://doaj.org/article/e337fefdc64c493baded80cc6bb8c6e0
Publikováno v:
Discover Internet of Things, Vol 4, Iss 1, Pp 1-14 (2024)
Abstract This paper presents comparative analysis of lattice-based cryptographic schemes, focusing on their runtime and memory performance to evaluate their suitability for secure IoT communications. Specifically, analyzing FrodoKEM, Kyber, and sntru
Externí odkaz:
https://doaj.org/article/67989c8c9cf64e2187575db2d9222d48
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 4, Pp 989-1000 (2024)
The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus has been given to securing such devices. As these
Externí odkaz:
https://doaj.org/article/c02c63cd701d425b98abbe3eb3531596
Publikováno v:
Tongxin xuebao, Vol 45, Pp 184-195 (2024)
In order to solve the inadequacy of traditional blind signature schemes in resisting quantum computing attacks during interactions between users, signers, and verifiers was addressed, a novel quantum-resistant blind signature scheme named CDBS was pr
Externí odkaz:
https://doaj.org/article/42695eb9a2114936a9a091531c634733
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-13 (2024)
Abstract A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko, and Barbeau. Security of the MPPK key encapsulation mechanism does not rely on the prime facto
Externí odkaz:
https://doaj.org/article/b9a5a3408d394d3f81744ab92c9a87ea
Autor:
Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chávez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, Francisco Rodríguez-Henríquez
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
SQIsign is a well-known post-quantum signature scheme due to its small combined signature and public-key size. However, SQIsign suffers from notably long signing times, and verification times are not short either. To improve this, recent research has
Externí odkaz:
https://doaj.org/article/0e30e48d1b254596b11af416421837f3
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the sess
Externí odkaz:
https://doaj.org/article/d14d03b0b71b4e1a8499f46308d66b62
Autor:
Yi Ouyang, Yihong Zhu, Wenping Zhu, Bohan Yang, Zirui Zhang, Hanning Wang, Qichao Tao, Min Zhu, Shaojun Wei, Leibo Liu
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
Falcon is a lattice-based quantum-resistant digital signature scheme renowned for its high signature generation/verification speed and compact signature size. The scheme has been selected to be drafted in the third round of the post-quantum cryptogra
Externí odkaz:
https://doaj.org/article/5988255d9aac4eafa6ad2e0e58e917ba
Autor:
Haiyue Dong, Qian Guo
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
In this paper, we introduce OT-PCA, a novel approach for conducting Plaintext-Checking (PC) oracle based side-channel attacks, specifically designed for Hamming Quasi-Cyclic (HQC). By calling the publicly accessible HQC decoder, we build offline temp
Externí odkaz:
https://doaj.org/article/42e61eb45cd741a8a17c22042d3748cb
Publikováno v:
JeDEM - eJournal of eDemocracy & Open Government, Vol 16, Iss 3 (2024)
Developments in quantum computing may jeopardize the security of internet voting. Such developments could compromise important electoral requirements, including integrity, eligibility, or the secrecy of the vote. Even the contents of a vote cast onli
Externí odkaz:
https://doaj.org/article/14d3db75f6d64def9eaf069d752020c2