Academic literature on the topic 'Post-quantum security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Post-quantum security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Post-quantum security"
Li, Silong, Yuxiang Chen, Lin Chen, Jing Liao, Chanchan Kuang, Kuanching Li, Wei Liang, and Naixue Xiong. "Post-Quantum Security: Opportunities and Challenges." Sensors 23, no. 21 (October 26, 2023): 8744. http://dx.doi.org/10.3390/s23218744.
Full textHosoyamada, Akinori. "On post-quantum security of symmetric cryptosystems." IEICE ESS Fundamentals Review 17, no. 1 (July 1, 2023): 59–71. http://dx.doi.org/10.1587/essfr.17.1_59.
Full textSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (February 18, 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Full textDjordjevic, Ivan B. "Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography." Entropy 24, no. 7 (July 6, 2022): 935. http://dx.doi.org/10.3390/e24070935.
Full textBene, Fruzsina, and Attila Kiss. "Post-Quantum Security Overview of the Public Key Infrastructure." SYSTEM THEORY, CONTROL AND COMPUTING JOURNAL 3, no. 2 (December 31, 2023): 27–35. http://dx.doi.org/10.52846/stccj.2023.3.2.55.
Full textCultice, Tyler, and Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security." Information 13, no. 8 (August 9, 2022): 382. http://dx.doi.org/10.3390/info13080382.
Full textSong, Gyeongju, Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Waikong Lee, and Hwajeong Seo. "SPEEDY Quantum Circuit for Grover’s Algorithm." Applied Sciences 12, no. 14 (July 7, 2022): 6870. http://dx.doi.org/10.3390/app12146870.
Full textB, Sonia Singh, Sravan Karthik T, and Shubhaprada KP. "Investigating SHA and Proposing SPHINCS+ as a Post Quantum Algorithm (PQC)." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (September 30, 2023): 1611–15. http://dx.doi.org/10.22214/ijraset.2023.55872.
Full textAravinda, S., Anindita Banerjee, Anirban Pathak, and R. Srikanth. "Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories." International Journal of Quantum Information 12, no. 07n08 (November 2014): 1560020. http://dx.doi.org/10.1142/s0219749915600205.
Full textYevseiev, Serhii, Alla Gavrilova, Bogdan Tomashevsky, and Firuz Samadov. "Research of crypto-code designs construction for using in post quantum cryptography." Development Management 16, no. 4 (February 4, 2019): 26–39. http://dx.doi.org/10.21511/dm.4(4).2018.03.
Full textDissertations / Theses on the topic "Post-quantum security"
Wilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.
Full textMagnusson, Olof, and Mats Hurtig. "Post-Quantum Public Key Cryptography for the Internet of Things." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40459.
Full textDeneuville, Jean-Christophe. "Contributions à la cryptographie post-quantique." Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0112/document.
Full textIn the likely event where a quantum computer sees the light, number theoretic based cryptographic primitives being actually in use might become deciduous. This results in an important need to design schemes that could face off this new threat. Lattices and Error Correcting Codes are mathematical tools allowing to build algebraic problems, for which – up to-date – no quantum algorithm significantly speeding up their resolution is known. In this thesis, we propose four such kind cryptographic primitives: two signatures schemes (among those a traceable one) based on lattices, a signature delegation protocol using fully homomorphic encryption, and a new framework for building very efficient and practical code-based cryptosystems. These contributions are fed with concrete parameters allowing to gauge the concrete costs of security in a post-quantum world
Bonnoron, Guillaume. "A journey towards practical fully homomorphic encryption." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0073/document.
Full textCraig Gentry presented in 2009 the first fully homomorphic encryption scheme. Since then, a tremendous effort has been, and still is, dedicated by the cryptographic community to make practical this new kind of cryptography. It is revolutionnary because it enables direct computation on encrypted data (without the need for the computing entity to decrypt them). Several trends have been developed in parallel, exploring on one side fully homomorphic encryption schemes, more versatile for applications but more costly in terms of time and memory. On the other side, the somewhat homomorphic encryption schemes are less flexible but more efficient. This thesis, achieved within the Chair of Naval Cyber Defence, contributes to these trends. We have endorsed different roles. First, an attacker position to assess the hardness of the security assumptions of the proposals. Then, we conducted a state-of-the-art of the most promising schemes in order to identify the best(s) depending on the use-cases and to give precise advice to appropriately set the parameters that drive security level, ciphertext sizes and computation costs. Last, we endorsed a designer role. We proposed a new powerful fully homomorphic encryption scheme together with its open-source implementation, available on github
Bindel, Nina [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Douglas [Akademischer Betreuer] Stebila. "On the Security of Lattice-Based Signature Schemes in a Post-Quantum World / Nina Bindel ; Johannes Buchmann, Douglas Stebila." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1169825729/34.
Full textSchrottenloher, André. "Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS271.
Full textModern cryptography relies on the notion of computational security. The level of security given by a cryptosystem is expressed as an amount of computational resources required to break it. The goal of cryptanalysis is to find attacks, that is, algorithms with lower complexities than the conjectural bounds.With the advent of quantum computing devices, these levels of security have to be updated to take a whole new notion of algorithms into account. At the same time, cryptography is becoming widely used in small devices (smart cards, sensors), with new cost constraints.In this thesis, we study the security of secret-key cryptosystems against quantum adversaries.We first build new quantum algorithms for k-list (k-XOR or k-SUM) problems, by composing exhaustive search procedures. Next, we present dedicated cryptanalysis results, starting with a new quantum cryptanalysis tool, the offline Simon's algorithm. We describe new attacks against the lightweight algorithms Spook and Gimli and we perform the first quantum security analysis of the standard cipher AES.Finally, we specify Saturnin, a family of lightweight cryptosystems oriented towards post-quantum security. Thanks to a very similar structure, its security relies largely on the analysis of AES
Zhang, Zheng. "The Singularity Attack on Himq-3: A High-Speed Signature Scheme Based on Multivariate Quadratic Equations." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1623251333085284.
Full textKaim, Guillaume. "Cryptographie post-quantique pour la protection de la vie privée." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S077.
Full textThe past few years have seen the rising of the quantum computers, that are a serious threat to nearly all the actual cryptographic schemes used in practice. In this thesis we propose some new constructions to prevent this obsolescence by building our schemes on the mathematical tool of lattices that is assumed post-quantum resistant. We firstly develop a group signature scheme, allowing each member composing the group to anonymously sign on the behalf of the group. We add a supplementary property, which is the froward secrecy. This property cut the time in periods, such that each secret key is updated when entering a new period. We also propose a blind signature scheme, which is an interactive protocol between an user, who wants to sign a message, with a signer who possesses the signing secret key. We improve the state-of-the art by proposing a constructions without any restart and with a more efficient security. Finally as a use case of the blind signature, we develop an evoting protocol that take as a basis the construction described above
Majumdar, Aalo. "Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5573.
Full textBindel, Nina. "On the Security of Lattice-Based Signature Schemes in a Post-Quantum World." Phd thesis, 2018. https://tuprints.ulb.tu-darmstadt.de/8100/8/Dissertation_NBindel_v1.pdf.
Full textBooks on the topic "Post-quantum security"
Kumar, Adarsh, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, and Surbhi Bhatia Khan, eds. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0088-2.
Full textDjordjevic, Ivan B., ed. Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-5004-6.
Full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textBadhwar, Raj. CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2022.
Find full textDing, Jintai, and Jean-Pierre Tillich. Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings. Springer, 2020.
Find full textBadhwar, Raj. The CISOs Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2021.
Find full textDing, Jintai, and Rainer Steinwandt. Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers. Springer, 2019.
Find full textBook chapters on the topic "Post-quantum security"
Bernstein, Daniel J. "Post-Quantum Cryptography." In Encyclopedia of Cryptography and Security, 949–50. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_386.
Full textBhatia, Amandeep Singh, and Ajay Kumar. "Post-Quantum Cryptography." In Emerging Security Algorithms and Techniques, 139–58. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-9.
Full textArya, Ashish, Arti Ranjan, and Amrit Kumar Agrawal. "Post-quantum image security." In Digital Image Security, 43–75. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003468974-3.
Full textCovic, Ana, Sreeja Chowdhury, Rabin Yu Acharya, Fatemeh Ganji, and Domenic Forte. "Post-Quantum Hardware Security." In Emerging Topics in Hardware Security, 199–227. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_8.
Full textCartor, Ryann, and Daniel Smith-Tone. "An Updated Security Analysis of PFLASH." In Post-Quantum Cryptography, 241–54. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59879-6_14.
Full textFehr, Serge, and Yu-Hsuan Huang. "On the Quantum Security of HAWK." In Post-Quantum Cryptography, 405–16. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-40003-2_15.
Full textYasuda, Takanori, and Kouichi Sakurai. "A Security Analysis of Uniformly-Layered Rainbow." In Post-Quantum Cryptography, 275–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25405-5_18.
Full textCzajkowski, Jan, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, and Dominique Unruh. "Post-quantum Security of the Sponge Construction." In Post-Quantum Cryptography, 185–204. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_9.
Full textPerlner, Ray, and Daniel Smith-Tone. "Security Analysis and Key Modification for ZHFE." In Post-Quantum Cryptography, 197–212. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29360-8_13.
Full textSoukharev, Vladimir, David Jao, and Srinath Seshadri. "Post-Quantum Security Models for Authenticated Encryption." In Post-Quantum Cryptography, 64–78. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29360-8_5.
Full textConference papers on the topic "Post-quantum security"
Hulsing, Andreas, Kai-Chun Ning, Peter Schwabe, Florian Weber, and Philip R. Zimmermann. "Post-quantum WireGuard." In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021. http://dx.doi.org/10.1109/sp40001.2021.00030.
Full textLi, Xiangdong, Lin Leung, Andis Chi-Tung Kwan, Xiaowen Zhang, Dammika Kahanda, and Michael Anshel. "Post-quantum key exchange protocols." In Defense and Security Symposium, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.665685.
Full textAngel, Yawning, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, and Florian Weber. "Post Quantum Noise." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3548606.3560577.
Full textSanon, Sogo Pierre, Ihab Alzalam, and Hans D. Schotten. "Quantum and Post-Quantum Security in Future Networks." In 2023 IEEE Future Networks World Forum (FNWF). IEEE, 2023. http://dx.doi.org/10.1109/fnwf58287.2023.10520624.
Full textSharifian, Setareh, Reihaneh Safavi-Naini, and Fuchun Lin. "Post-quantum Security using Channel Noise." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3243734.3278517.
Full textClancy, T. Charles, Robert W. McGwier, and Lidong Chen. "Post-quantum cryptography and 5G security." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3324882.
Full textMisra, Manoj Kumar, Rashi Mathur, and Rishish Tripathi. "On Post Quantum Wireless Communication Security." In 2021 5th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2021. http://dx.doi.org/10.1109/iscon52037.2021.9702489.
Full text"Conference Panel 1: Post-Quantum Security." In 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2021. http://dx.doi.org/10.1109/tpsisa52974.2021.00047.
Full textJoshi, Sandeep, Amit Kumar Bairwa, Anton Pavlovich Pljonkin, Pradumn Garg, and Kshitij Agrawal. "From Pre-Quantum to Post-Quantum RSA." In NISS 2023: The 6th International Conference on Networking, Intelligent Systems & Security. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3607720.3607721.
Full textFritzmann, Tim, Jonas Vith, and Johanna Sepulveda. "Strengthening Post-Quantum Security for Automotive Systems." In 2020 23rd Euromicro Conference on Digital System Design (DSD). IEEE, 2020. http://dx.doi.org/10.1109/dsd51259.2020.00094.
Full textReports on the topic "Post-quantum security"
Perdigão, Rui A. P. Strengthening Multi-Hazard Resilience with Quantum Aerospace Systems Intelligence. Synergistic Manifolds, January 2024. http://dx.doi.org/10.46337/240301.
Full textFluhrer, S., P. Kampanakis, D. McGrew, and V. Smyslov. Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC Editor, June 2020. http://dx.doi.org/10.17487/rfc8784.
Full text