We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,950 results
  1. Implementing Post-quantum Cryptography for Developers

    Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...

    Julius Hekkala, Mari Muurman, ... Visa Vallivaara in SN Computer Science
    Article Open access 29 April 2023
  2. Post-quantum Cryptography

    Post-quantum Cryptography discusses the need for a new generation of cryptography to protect against future quantum computers. The underlying...
    Chapter Open access 2023
  3. Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography

    Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a...

    Article 20 March 2023
  4. Post-Quantum Cryptography 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings

    This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park,...

    Thomas Johansson, Daniel Smith-Tone in Lecture Notes in Computer Science
    Conference proceedings 2023
  5. Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography

    Hybrid key encapsulation is in the process of becoming the de-facto standard for integration of post-quantum cryptography (PQC). Supporting two...

    Felix Oberhansl, Tim Fritzmann, ... Georg Sigl in Journal of Cryptographic Engineering
    Article Open access 24 August 2023
  6. How Does Post-quantum Cryptography Affect Central Bank Digital Currency?

    Central Bank Digital Currency (CBDC) is an emerging trend in digital payments, with the vast majority of central banks around the world researching,...
    Lars Hupel, Makan Rafiee in Ubiquitous Security
    Conference paper 2024
  7. QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging

    ISO 15118 enables charging and billing of Electric Vehicles (EVs) without user interaction by using locally installed cryptographic credentials that...
    Dustin Kern, Christoph Krauß, ... Ruben Niederhagen in Applied Cryptography and Network Security
    Conference paper 2023
  8. On the Masking-Friendly Designs for Post-quantum Cryptography

    Masking is a well-known and provably secure countermeasure against side-channel attacks. However, due to additional redundant computations,...
    Suparna Kundu, Angshuman Karmakar, Ingrid Verbauwhede in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  9. Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II

    ​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...

    Markku-Juhani Saarinen, Daniel Smith-Tone in Lecture Notes in Computer Science
    Conference proceedings 2024
  10. Post-Quantum Cryptography 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings

    This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event...
    Jung Hee Cheon, Thomas Johansson in Lecture Notes in Computer Science
    Conference proceedings 2022
  11. Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I

    ​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...

    Markku-Juhani Saarinen, Daniel Smith-Tone in Lecture Notes in Computer Science
    Conference proceedings 2024
  12. A Performance Evaluation of IPsec with Post-Quantum Cryptography

    As Post-Quantum Cryptography (PQC) incurs higher costs in some metrics compared to conventional cryptosystems, performance evaluation to determine...
    Seungyeon Bae, Yousung Chang, ... Youngjoo Shin in Information Security and Cryptology – ICISC 2022
    Conference paper 2023
  13. Secure Boot in Post-Quantum Era

    Secure boot is a standard feature for ensuring the authentication and integrity of software. For this purpose, secure boot leverages the advantage of...
    Megha Agrawal, Kumar Duraisamy, ... Vishal Saraswat in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  14. PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm

    The advancement of quantum computers and the potential polynomial-time solution of Elliptic Curve Cryptography (ECC) using the Shor algorithm pose a...
    Wonwoong Kim, Yeajun Kang, ... Hwajeong Seo in Information Security Applications
    Conference paper 2024
  15. Finite Field Arithmetic in Large Characteristic for Classical and Post-quantum Cryptography

    Both classical and post-quantum cryptography massively use large characteristic finite fields or rings. Consequently, basic arithmetic on these...
    Sylvain Duquesne in Arithmetic of Finite Fields
    Conference paper 2023
  16. Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods

    Abstract

    The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown...

    S. V. Bezzateev, S. G. Fomicheva, A. F. Suprun in Automatic Control and Computer Sciences
    Article 01 December 2023
  17. Patent Landscape in the field of Hash-Based Post-Quantum Signatures

    Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization...
    Megha Agrawal, Kumar Duraisamy, ... Vishal Saraswat in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  18. Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation

    Developers of computer-aided cryptographic tools are optimistic that formal methods will become a vital part of develo** new cryptographic systems....
    Martin Brain, Carlos Cid, ... Wrenna Robson in Code-Based Cryptography
    Conference paper 2023
  19. Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices

    This document studies the current state of post-quantum cryptography implementation feasibility, providing general approaches that developers and...
    Petr Muzikant, Jan Willemson in Ubiquitous Security
    Conference paper 2024
  20. Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysis

    Along with the possibility of accelerated polynomial multiplication, the Toom-Cook k–way multiplication technique has drawn significant interest in...
    Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.