Articles with "post quantum" as a keyword



Photo from wikipedia

Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography

Sign Up to like & get
recommendations!
Published in 2021 at "Mediterranean Journal of Mathematics"

DOI: 10.1007/s00009-021-01841-2

Abstract: Functional encryption (FE) is an exciting new public key paradigm that provides solutions to most of the security challenges of cloud computing in a non-interactive manner. In the context of FE, inner product functional encryption… read more here.

Keywords: post quantum; public key; mathbf; cryptography ... See more keywords
Photo by dtopkin1 from unsplash

Privacy-preserving computation in the post-quantum era

Sign Up to like & get
recommendations!
Published in 2021 at "National Science Review"

DOI: 10.1093/nsr/nwab115

Abstract: This perspectives article surveys the most promising privacy-preserving cryptographic technologies including secure multiparty computation, zero-knowledge proofs and fully homomorphic encryption, and their various real-world applications. read more here.

Keywords: post quantum; privacy preserving; preserving computation; computation post ... See more keywords
Photo by goian from unsplash

Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2968985

Abstract: Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. In the… read more here.

Keywords: post quantum; quantum blockchain; cryptography; blockchain ... See more keywords
Photo by goian from unsplash

Joint QKD-Post-Quantum Cryptosystems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3018909

Abstract: To extend the transmission distance and/or improve secret-key rate of QKD protocols, we propose to employ the joint QKD-post-quantum cryptosystems in which QKD is used for raw-key transmission while the post-quantum cryptography (PQC) subsystem to… read more here.

Keywords: post quantum; post; quantum cryptosystems; joint qkd ... See more keywords
Photo by appolinary_kalashnikova from unsplash

Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3077843

Abstract: Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes… read more here.

Keywords: post quantum; energy efficiency; energy; algorithms ... See more keywords
Photo by pavel_kalenik from unsplash

A Flexible NTT-Based Multiplier for Post-Quantum Cryptography

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3234816

Abstract: In this work an NTT-based (Number Theoretic Transform) multiplier for code-based Post-Quantum Cryptography (PQC) is presented, supporting Quasi Cyclic Low/Moderate-Density Parity-Check (QC LDPC/MDPC) codes. The cyclic matrix product, which is the fundamental operation required in… read more here.

Keywords: post quantum; based multiplier; flexible ntt; ntt based ... See more keywords
Photo by homajob from unsplash

From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2958788

Abstract: Although quantum computing is still in its nascent age, its evolution threatens the most popular public-key encryption systems. Such systems are essential for today’s Internet security due to their ability for solving the key distribution… read more here.

Keywords: post quantum; quantum; security; quantum iot ... See more keywords
Photo by ldxcreative from unsplash

RePQC: A 3.4-uJ/Op 48-kOPS Post-Quantum Crypto-Processor for Multiple-Mathematical Problems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Journal of Solid-State Circuits"

DOI: 10.1109/jssc.2022.3216758

Abstract: Post-quantum cryptography (PQC) is investigated to replace the classical public cryptography algorithms, which would be completely broken by large-scale quantum computers. However, current PQC schemes have completely different mathematical foundations and parameter sets, which makes… read more here.

Keywords: pqc; post quantum; multiple mathematical; processor ... See more keywords
Photo by creedi from unsplash

Post-Quantum Key Exchange on ARMv8-A: A New Hope for NEON Made Simple

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2017.2773524

Abstract: NewHope and NewHope-Simple are two recently proposed post-quantum key exchange protocols based on the hardness of the Ring-LWE problem. Due to their high security margins and performance, there have already been discussions and proposals for… read more here.

Keywords: post quantum; key exchange; neon; exchange ... See more keywords
Photo from wikipedia

Reliable Architectures for Composite-Field-Oriented Constructions of McEliece Post-Quantum Cryptography on FPGA

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2020.3019987

Abstract: Code-based cryptography based on binary Goppa codes is a promising solution for thwarting attacks based on quantum computers. The McEliece cryptosystem is a code-based public-key cryptosystem which is believed to be resistant against quantum attacks.… read more here.

Keywords: post quantum; cryptography; composite field; quantum cryptography ... See more keywords
Photo from wikipedia

Accelerated RISC-V for Post-Quantum SIKE

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2022.3162626

Abstract: In this work, we present a fast and area-efficient software-hardware implementation of the supersingular isogeny key encapsulation (SIKE) mechanism. Our software-hardware design achieves both the flexibility of software as well as the efficient performance of… read more here.

Keywords: software; risc post; hardware; sike ... See more keywords