We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 2,950 results
  1. Post-quantum security design for hierarchical healthcare systems based on lattices

    The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks,...

    Manel Boujelben, Mohamed Abid in The Journal of Supercomputing
    Article 25 April 2024
  2. Automated Issuance of Post-Quantum Certificates: A New Challenge

    The Automatic Certificate Management Environment protocol (ACME) has significantly contributed to the widespread use of digital certificates in...
    Alexandre Augusto Giron, Frederico Schardong, ... Victor Mateu in Applied Cryptography and Network Security
    Conference paper 2024
  3. Post-Quantum Protocols for Banking Applications

    With the NIST competition for Post-Quantum (PQ) algorithms standardization coming to an end, it is urgent to address the question of integrating PQ...
    Luk Bettale, Marco De Oliveira, Emmanuelle Dottax in Smart Card Research and Advanced Applications
    Conference paper 2023
  4. VDOO: A Short, Fast, Post-quantum Multivariate Digital Signature Scheme

    Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need to continue develo** post-quantum cryptosystems...
    Anindya Ganguly, Angshuman Karmakar, Nitin Saxena in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  5. Post-quantum Cryptography in 6G

    The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a...
    Juha Partala in 6G Mobile Wireless Networks
    Chapter 2021
  6. Post-quantum Security of Tweakable Even-Mansour, and Applications

    The tweakable Even-Mansour construction yields a tweakable block cipher from a public random permutation. We prove post-quantum security of tweakable...
    Gorjan Alagic, Chen Bai, ... Patrick Struck in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  7. Quantum-safe cryptography: crossroads of coding theory and cryptography

    We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...

    Jiabo Wang, Ling Liu, ... Cong Ling in Science China Information Sciences
    Article Open access 21 December 2021
  8. Cryptography of Blockchain

    With the development of digital currencies and 5G technology, blockchain has gained widespread attention and is being used in areas such as...
    Ying Long, Yinyan Gong, ... Kuan-ching Li in Smart Computing and Communication
    Conference paper 2023
  9. SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures

    SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...

    Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, ... André L. M. Santos in Journal of Cryptographic Engineering
    Article 16 October 2023
  10. The Superlinearity Problem in Post-quantum Blockchains

    The proof of work mechanism by which many blockchain-based protocols achieve consensus may be undermined by the use of quantum computing in...
    Sunoo Park, Nicholas Spooner in Financial Cryptography and Data Security
    Conference paper 2024
  11. Hybrid Post-quantum Signatures in Hardware Security Keys

    Recent advances in quantum computing are increasingly jeopardizing the security of cryptosystems currently in widespread use, such as RSA or...
    Diana Ghinea, Fabian Kaczmarczyck, ... Elie Bursztein in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  12. Post-quantum security on the Lai–Massey scheme

    Post-quantum cryptography has attracted much attention from worldwide cryptologists. A growing number of symmetric cryptography algorithms have been...

    Zhongya Zhang, Wenling Wu, ... Bolin Wang in Designs, Codes and Cryptography
    Article 29 April 2023
  13. Post-Quantum Cryptography 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings

    This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South...

    Jung Hee Cheon, Jean-Pierre Tillich in Lecture Notes in Computer Science
    Conference proceedings 2021
  14. Post-quantum DNSSEC over UDP via QNAME-Based Fragmentation

    In a typical network, any DNS message exceeding the recommended size of 1232 bytes would 1) either be fragmented into several UDP/IP packets 2) or...
    Aditya Singh Rawat, Mahabir Prasad Jhanwar in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  15. WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography

    Transition to PQC brings complex challenges to builders of secure cryptographic hardware. PQC keys usually need to be stored off-module and protected...
    Markku-Juhani O. Saarinen in Post-Quantum Cryptography
    Conference paper 2023
  16. Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

    In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...

    Purvi Tandel, Jitendra Nasriwala in Service Oriented Computing and Applications
    Article 14 June 2024
  17. Full Post-Quantum Datagram TLS Handshake in the Internet of Things

    Quantum computers are a threat to the current standards for secure communication. The Datagram Transport Layer Security (DTLS) protocol is a common...
    Callum McLoughlin, Clémentine Gritti, Juliet Samandari in Codes, Cryptology and Information Security
    Conference paper 2023
  18. Constructive Post-Quantum Reductions

    Is it possible to convert classical reductions into post-quantum ones? It is customary to argue that while this is problematic in the interactive...
    Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  19. Challenges of post-quantum digital signing in real-world applications: a survey

    Public key cryptography is threatened by the advent of quantum computers. Using Shor’s algorithm on a large-enough quantum computer, an attacker can...

    Teik Guan Tan, Pawel Szalachowski, Jianying Zhou in International Journal of Information Security
    Article 09 April 2022
  20. Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

    Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even...
    Christof Paar, Jan Pelzl, Tim Güneysu
    Textbook 2024
Did you find what you were looking for? Share feedback.