Search
Search Results
-
Implementing Post-quantum Cryptography for Developers
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...
-
Post-quantum Cryptography
Post-quantum Cryptography discusses the need for a new generation of cryptography to protect against future quantum computers. The underlying... -
Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a...
-
Post-Quantum Cryptography 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park,...
-
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography
Hybrid key encapsulation is in the process of becoming the de-facto standard for integration of post-quantum cryptography (PQC). Supporting two...
-
How Does Post-quantum Cryptography Affect Central Bank Digital Currency?
Central Bank Digital Currency (CBDC) is an emerging trend in digital payments, with the vast majority of central banks around the world researching,... -
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
ISO 15118 enables charging and billing of Electric Vehicles (EVs) without user interaction by using locally installed cryptographic credentials that... -
On the Masking-Friendly Designs for Post-quantum Cryptography
Masking is a well-known and provably secure countermeasure against side-channel attacks. However, due to additional redundant computations,... -
Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...
-
Post-Quantum Cryptography 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event... -
Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...
-
A Performance Evaluation of IPsec with Post-Quantum Cryptography
As Post-Quantum Cryptography (PQC) incurs higher costs in some metrics compared to conventional cryptosystems, performance evaluation to determine... -
Secure Boot in Post-Quantum Era
Secure boot is a standard feature for ensuring the authentication and integrity of software. For this purpose, secure boot leverages the advantage of... -
PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm
The advancement of quantum computers and the potential polynomial-time solution of Elliptic Curve Cryptography (ECC) using the Shor algorithm pose a... -
Finite Field Arithmetic in Large Characteristic for Classical and Post-quantum Cryptography
Both classical and post-quantum cryptography massively use large characteristic finite fields or rings. Consequently, basic arithmetic on these... -
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
AbstractThe information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown...
-
Patent Landscape in the field of Hash-Based Post-Quantum Signatures
Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization... -
Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation
Developers of computer-aided cryptographic tools are optimistic that formal methods will become a vital part of develo** new cryptographic systems.... -
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices
This document studies the current state of post-quantum cryptography implementation feasibility, providing general approaches that developers and... -
Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysis
Along with the possibility of accelerated polynomial multiplication, the Toom-Cook k–way multiplication technique has drawn significant interest in...