Search
Search Results
-
Post-quantum security design for hierarchical healthcare systems based on lattices
The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks,...
-
Automated Issuance of Post-Quantum Certificates: A New Challenge
The Automatic Certificate Management Environment protocol (ACME) has significantly contributed to the widespread use of digital certificates in... -
Post-Quantum Protocols for Banking Applications
With the NIST competition for Post-Quantum (PQ) algorithms standardization coming to an end, it is urgent to address the question of integrating PQ... -
VDOO: A Short, Fast, Post-quantum Multivariate Digital Signature Scheme
Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need to continue develo** post-quantum cryptosystems... -
Post-quantum Cryptography in 6G
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a... -
Post-quantum Security of Tweakable Even-Mansour, and Applications
The tweakable Even-Mansour construction yields a tweakable block cipher from a public random permutation. We prove post-quantum security of tweakable... -
Quantum-safe cryptography: crossroads of coding theory and cryptography
We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...
-
Cryptography of Blockchain
With the development of digital currencies and 5G technology, blockchain has gained widespread attention and is being used in areas such as... -
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures
SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...
-
The Superlinearity Problem in Post-quantum Blockchains
The proof of work mechanism by which many blockchain-based protocols achieve consensus may be undermined by the use of quantum computing in... -
Hybrid Post-quantum Signatures in Hardware Security Keys
Recent advances in quantum computing are increasingly jeopardizing the security of cryptosystems currently in widespread use, such as RSA or... -
Post-quantum security on the Lai–Massey scheme
Post-quantum cryptography has attracted much attention from worldwide cryptologists. A growing number of symmetric cryptography algorithms have been...
-
Post-Quantum Cryptography 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South...
-
Post-quantum DNSSEC over UDP via QNAME-Based Fragmentation
In a typical network, any DNS message exceeding the recommended size of 1232 bytes would 1) either be fragmented into several UDP/IP packets 2) or... -
WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography
Transition to PQC brings complex challenges to builders of secure cryptographic hardware. PQC keys usually need to be stored off-module and protected... -
Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...
-
Full Post-Quantum Datagram TLS Handshake in the Internet of Things
Quantum computers are a threat to the current standards for secure communication. The Datagram Transport Layer Security (DTLS) protocol is a common... -
Constructive Post-Quantum Reductions
Is it possible to convert classical reductions into post-quantum ones? It is customary to argue that while this is problematic in the interactive... -
Challenges of post-quantum digital signing in real-world applications: a survey
Public key cryptography is threatened by the advent of quantum computers. Using Shor’s algorithm on a large-enough quantum computer, an attacker can...
-
Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even...