Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Mediterranean Journal of Mathematics"
DOI: 10.1007/s00009-021-01841-2
Abstract: Functional encryption (FE) is an exciting new public key paradigm that provides solutions to most of the security challenges of cloud computing in a non-interactive manner. In the context of FE, inner product functional encryption…
read more here.
Keywords:
post quantum;
public key;
mathbf;
cryptography ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "National Science Review"
DOI: 10.1093/nsr/nwab115
Abstract: This perspectives article surveys the most promising privacy-preserving cryptographic technologies including secure multiparty computation, zero-knowledge proofs and fully homomorphic encryption, and their various real-world applications.
read more here.
Keywords:
post quantum;
privacy preserving;
preserving computation;
computation post ... See more keywords
Photo by goian from unsplash
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2968985
Abstract: Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. In the…
read more here.
Keywords:
post quantum;
quantum blockchain;
cryptography;
blockchain ... See more keywords
Photo by goian from unsplash
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3018909
Abstract: To extend the transmission distance and/or improve secret-key rate of QKD protocols, we propose to employ the joint QKD-post-quantum cryptosystems in which QKD is used for raw-key transmission while the post-quantum cryptography (PQC) subsystem to…
read more here.
Keywords:
post quantum;
post;
quantum cryptosystems;
joint qkd ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3077843
Abstract: Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes…
read more here.
Keywords:
post quantum;
energy efficiency;
energy;
algorithms ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3234816
Abstract: In this work an NTT-based (Number Theoretic Transform) multiplier for code-based Post-Quantum Cryptography (PQC) is presented, supporting Quasi Cyclic Low/Moderate-Density Parity-Check (QC LDPC/MDPC) codes. The cyclic matrix product, which is the fundamental operation required in…
read more here.
Keywords:
post quantum;
based multiplier;
flexible ntt;
ntt based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2958788
Abstract: Although quantum computing is still in its nascent age, its evolution threatens the most popular public-key encryption systems. Such systems are essential for today’s Internet security due to their ability for solving the key distribution…
read more here.
Keywords:
post quantum;
quantum;
security;
quantum iot ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Journal of Solid-State Circuits"
DOI: 10.1109/jssc.2022.3216758
Abstract: Post-quantum cryptography (PQC) is investigated to replace the classical public cryptography algorithms, which would be completely broken by large-scale quantum computers. However, current PQC schemes have completely different mathematical foundations and parameter sets, which makes…
read more here.
Keywords:
pqc;
post quantum;
multiple mathematical;
processor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2017.2773524
Abstract: NewHope and NewHope-Simple are two recently proposed post-quantum key exchange protocols based on the hardness of the Ring-LWE problem. Due to their high security margins and performance, there have already been discussions and proposals for…
read more here.
Keywords:
post quantum;
key exchange;
neon;
exchange ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2020.3019987
Abstract: Code-based cryptography based on binary Goppa codes is a promising solution for thwarting attacks based on quantum computers. The McEliece cryptosystem is a code-based public-key cryptosystem which is believed to be resistant against quantum attacks.…
read more here.
Keywords:
post quantum;
cryptography;
composite field;
quantum cryptography ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"
DOI: 10.1109/tcsi.2022.3162626
Abstract: In this work, we present a fast and area-efficient software-hardware implementation of the supersingular isogeny key encapsulation (SIKE) mechanism. Our software-hardware design achieves both the flexibility of software as well as the efficient performance of…
read more here.
Keywords:
software;
risc post;
hardware;
sike ... See more keywords