Gotowa bibliografia na temat „Post-quantum security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Post-quantum security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Post-quantum security"
Li, Silong, Yuxiang Chen, Lin Chen, Jing Liao, Chanchan Kuang, Kuanching Li, Wei Liang i Naixue Xiong. "Post-Quantum Security: Opportunities and Challenges". Sensors 23, nr 21 (26.10.2023): 8744. http://dx.doi.org/10.3390/s23218744.
Pełny tekst źródłaHosoyamada, Akinori. "On post-quantum security of symmetric cryptosystems". IEICE ESS Fundamentals Review 17, nr 1 (1.07.2023): 59–71. http://dx.doi.org/10.1587/essfr.17.1_59.
Pełny tekst źródłaSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh i Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, nr 2 (18.02.2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Pełny tekst źródłaDjordjevic, Ivan B. "Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography". Entropy 24, nr 7 (6.07.2022): 935. http://dx.doi.org/10.3390/e24070935.
Pełny tekst źródłaBene, Fruzsina, i Attila Kiss. "Post-Quantum Security Overview of the Public Key Infrastructure". SYSTEM THEORY, CONTROL AND COMPUTING JOURNAL 3, nr 2 (31.12.2023): 27–35. http://dx.doi.org/10.52846/stccj.2023.3.2.55.
Pełny tekst źródłaCultice, Tyler, i Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security". Information 13, nr 8 (9.08.2022): 382. http://dx.doi.org/10.3390/info13080382.
Pełny tekst źródłaSong, Gyeongju, Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Waikong Lee i Hwajeong Seo. "SPEEDY Quantum Circuit for Grover’s Algorithm". Applied Sciences 12, nr 14 (7.07.2022): 6870. http://dx.doi.org/10.3390/app12146870.
Pełny tekst źródłaB, Sonia Singh, Sravan Karthik T i Shubhaprada KP. "Investigating SHA and Proposing SPHINCS+ as a Post Quantum Algorithm (PQC)". International Journal for Research in Applied Science and Engineering Technology 11, nr 9 (30.09.2023): 1611–15. http://dx.doi.org/10.22214/ijraset.2023.55872.
Pełny tekst źródłaAravinda, S., Anindita Banerjee, Anirban Pathak i R. Srikanth. "Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories". International Journal of Quantum Information 12, nr 07n08 (listopad 2014): 1560020. http://dx.doi.org/10.1142/s0219749915600205.
Pełny tekst źródłaYevseiev, Serhii, Alla Gavrilova, Bogdan Tomashevsky i Firuz Samadov. "Research of crypto-code designs construction for using in post quantum cryptography". Development Management 16, nr 4 (4.02.2019): 26–39. http://dx.doi.org/10.21511/dm.4(4).2018.03.
Pełny tekst źródłaRozprawy doktorskie na temat "Post-quantum security"
Wilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures". Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.
Pełny tekst źródłaMagnusson, Olof, i Mats Hurtig. "Post-Quantum Public Key Cryptography for the Internet of Things". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40459.
Pełny tekst źródłaDeneuville, Jean-Christophe. "Contributions à la cryptographie post-quantique". Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0112/document.
Pełny tekst źródłaIn the likely event where a quantum computer sees the light, number theoretic based cryptographic primitives being actually in use might become deciduous. This results in an important need to design schemes that could face off this new threat. Lattices and Error Correcting Codes are mathematical tools allowing to build algebraic problems, for which – up to-date – no quantum algorithm significantly speeding up their resolution is known. In this thesis, we propose four such kind cryptographic primitives: two signatures schemes (among those a traceable one) based on lattices, a signature delegation protocol using fully homomorphic encryption, and a new framework for building very efficient and practical code-based cryptosystems. These contributions are fed with concrete parameters allowing to gauge the concrete costs of security in a post-quantum world
Bonnoron, Guillaume. "A journey towards practical fully homomorphic encryption". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0073/document.
Pełny tekst źródłaCraig Gentry presented in 2009 the first fully homomorphic encryption scheme. Since then, a tremendous effort has been, and still is, dedicated by the cryptographic community to make practical this new kind of cryptography. It is revolutionnary because it enables direct computation on encrypted data (without the need for the computing entity to decrypt them). Several trends have been developed in parallel, exploring on one side fully homomorphic encryption schemes, more versatile for applications but more costly in terms of time and memory. On the other side, the somewhat homomorphic encryption schemes are less flexible but more efficient. This thesis, achieved within the Chair of Naval Cyber Defence, contributes to these trends. We have endorsed different roles. First, an attacker position to assess the hardness of the security assumptions of the proposals. Then, we conducted a state-of-the-art of the most promising schemes in order to identify the best(s) depending on the use-cases and to give precise advice to appropriately set the parameters that drive security level, ciphertext sizes and computation costs. Last, we endorsed a designer role. We proposed a new powerful fully homomorphic encryption scheme together with its open-source implementation, available on github
Bindel, Nina [Verfasser], Johannes [Akademischer Betreuer] Buchmann i Douglas [Akademischer Betreuer] Stebila. "On the Security of Lattice-Based Signature Schemes in a Post-Quantum World / Nina Bindel ; Johannes Buchmann, Douglas Stebila". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1169825729/34.
Pełny tekst źródłaSchrottenloher, André. "Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS271.
Pełny tekst źródłaModern cryptography relies on the notion of computational security. The level of security given by a cryptosystem is expressed as an amount of computational resources required to break it. The goal of cryptanalysis is to find attacks, that is, algorithms with lower complexities than the conjectural bounds.With the advent of quantum computing devices, these levels of security have to be updated to take a whole new notion of algorithms into account. At the same time, cryptography is becoming widely used in small devices (smart cards, sensors), with new cost constraints.In this thesis, we study the security of secret-key cryptosystems against quantum adversaries.We first build new quantum algorithms for k-list (k-XOR or k-SUM) problems, by composing exhaustive search procedures. Next, we present dedicated cryptanalysis results, starting with a new quantum cryptanalysis tool, the offline Simon's algorithm. We describe new attacks against the lightweight algorithms Spook and Gimli and we perform the first quantum security analysis of the standard cipher AES.Finally, we specify Saturnin, a family of lightweight cryptosystems oriented towards post-quantum security. Thanks to a very similar structure, its security relies largely on the analysis of AES
Zhang, Zheng. "The Singularity Attack on Himq-3: A High-Speed Signature Scheme Based on Multivariate Quadratic Equations". University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1623251333085284.
Pełny tekst źródłaKaim, Guillaume. "Cryptographie post-quantique pour la protection de la vie privée". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S077.
Pełny tekst źródłaThe past few years have seen the rising of the quantum computers, that are a serious threat to nearly all the actual cryptographic schemes used in practice. In this thesis we propose some new constructions to prevent this obsolescence by building our schemes on the mathematical tool of lattices that is assumed post-quantum resistant. We firstly develop a group signature scheme, allowing each member composing the group to anonymously sign on the behalf of the group. We add a supplementary property, which is the froward secrecy. This property cut the time in periods, such that each secret key is updated when entering a new period. We also propose a blind signature scheme, which is an interactive protocol between an user, who wants to sign a message, with a signer who possesses the signing secret key. We improve the state-of-the art by proposing a constructions without any restart and with a more efficient security. Finally as a use case of the blind signature, we develop an evoting protocol that take as a basis the construction described above
Majumdar, Aalo. "Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved". Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5573.
Pełny tekst źródłaBindel, Nina. "On the Security of Lattice-Based Signature Schemes in a Post-Quantum World". Phd thesis, 2018. https://tuprints.ulb.tu-darmstadt.de/8100/8/Dissertation_NBindel_v1.pdf.
Pełny tekst źródłaKsiążki na temat "Post-quantum security"
Kumar, Adarsh, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar i Surbhi Bhatia Khan, red. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0088-2.
Pełny tekst źródłaDjordjevic, Ivan B., red. Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-5004-6.
Pełny tekst źródłaWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Znajdź pełny tekst źródłaWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Znajdź pełny tekst źródłaWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Znajdź pełny tekst źródłaWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Znajdź pełny tekst źródłaBadhwar, Raj. CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2022.
Znajdź pełny tekst źródłaDing, Jintai, i Jean-Pierre Tillich. Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings. Springer, 2020.
Znajdź pełny tekst źródłaBadhwar, Raj. The CISOs Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2021.
Znajdź pełny tekst źródłaDing, Jintai, i Rainer Steinwandt. Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers. Springer, 2019.
Znajdź pełny tekst źródłaCzęści książek na temat "Post-quantum security"
Bernstein, Daniel J. "Post-Quantum Cryptography". W Encyclopedia of Cryptography and Security, 949–50. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_386.
Pełny tekst źródłaBhatia, Amandeep Singh, i Ajay Kumar. "Post-Quantum Cryptography". W Emerging Security Algorithms and Techniques, 139–58. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-9.
Pełny tekst źródłaArya, Ashish, Arti Ranjan i Amrit Kumar Agrawal. "Post-quantum image security". W Digital Image Security, 43–75. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003468974-3.
Pełny tekst źródłaCovic, Ana, Sreeja Chowdhury, Rabin Yu Acharya, Fatemeh Ganji i Domenic Forte. "Post-Quantum Hardware Security". W Emerging Topics in Hardware Security, 199–227. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_8.
Pełny tekst źródłaCartor, Ryann, i Daniel Smith-Tone. "An Updated Security Analysis of PFLASH". W Post-Quantum Cryptography, 241–54. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59879-6_14.
Pełny tekst źródłaFehr, Serge, i Yu-Hsuan Huang. "On the Quantum Security of HAWK". W Post-Quantum Cryptography, 405–16. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-40003-2_15.
Pełny tekst źródłaYasuda, Takanori, i Kouichi Sakurai. "A Security Analysis of Uniformly-Layered Rainbow". W Post-Quantum Cryptography, 275–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25405-5_18.
Pełny tekst źródłaCzajkowski, Jan, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner i Dominique Unruh. "Post-quantum Security of the Sponge Construction". W Post-Quantum Cryptography, 185–204. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_9.
Pełny tekst źródłaPerlner, Ray, i Daniel Smith-Tone. "Security Analysis and Key Modification for ZHFE". W Post-Quantum Cryptography, 197–212. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29360-8_13.
Pełny tekst źródłaSoukharev, Vladimir, David Jao i Srinath Seshadri. "Post-Quantum Security Models for Authenticated Encryption". W Post-Quantum Cryptography, 64–78. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29360-8_5.
Pełny tekst źródłaStreszczenia konferencji na temat "Post-quantum security"
Hulsing, Andreas, Kai-Chun Ning, Peter Schwabe, Florian Weber i Philip R. Zimmermann. "Post-quantum WireGuard". W 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021. http://dx.doi.org/10.1109/sp40001.2021.00030.
Pełny tekst źródłaLi, Xiangdong, Lin Leung, Andis Chi-Tung Kwan, Xiaowen Zhang, Dammika Kahanda i Michael Anshel. "Post-quantum key exchange protocols". W Defense and Security Symposium, redaktorzy Eric J. Donkor, Andrew R. Pirich i Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.665685.
Pełny tekst źródłaAngel, Yawning, Benjamin Dowling, Andreas Hülsing, Peter Schwabe i Florian Weber. "Post Quantum Noise". W CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3548606.3560577.
Pełny tekst źródłaSanon, Sogo Pierre, Ihab Alzalam i Hans D. Schotten. "Quantum and Post-Quantum Security in Future Networks". W 2023 IEEE Future Networks World Forum (FNWF). IEEE, 2023. http://dx.doi.org/10.1109/fnwf58287.2023.10520624.
Pełny tekst źródłaSharifian, Setareh, Reihaneh Safavi-Naini i Fuchun Lin. "Post-quantum Security using Channel Noise". W CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3243734.3278517.
Pełny tekst źródłaClancy, T. Charles, Robert W. McGwier i Lidong Chen. "Post-quantum cryptography and 5G security". W WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3324882.
Pełny tekst źródłaMisra, Manoj Kumar, Rashi Mathur i Rishish Tripathi. "On Post Quantum Wireless Communication Security". W 2021 5th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2021. http://dx.doi.org/10.1109/iscon52037.2021.9702489.
Pełny tekst źródła"Conference Panel 1: Post-Quantum Security". W 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2021. http://dx.doi.org/10.1109/tpsisa52974.2021.00047.
Pełny tekst źródłaJoshi, Sandeep, Amit Kumar Bairwa, Anton Pavlovich Pljonkin, Pradumn Garg i Kshitij Agrawal. "From Pre-Quantum to Post-Quantum RSA". W NISS 2023: The 6th International Conference on Networking, Intelligent Systems & Security. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3607720.3607721.
Pełny tekst źródłaFritzmann, Tim, Jonas Vith i Johanna Sepulveda. "Strengthening Post-Quantum Security for Automotive Systems". W 2020 23rd Euromicro Conference on Digital System Design (DSD). IEEE, 2020. http://dx.doi.org/10.1109/dsd51259.2020.00094.
Pełny tekst źródłaRaporty organizacyjne na temat "Post-quantum security"
Perdigão, Rui A. P. Strengthening Multi-Hazard Resilience with Quantum Aerospace Systems Intelligence. Synergistic Manifolds, styczeń 2024. http://dx.doi.org/10.46337/240301.
Pełny tekst źródłaFluhrer, S., P. Kampanakis, D. McGrew i V. Smyslov. Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC Editor, czerwiec 2020. http://dx.doi.org/10.17487/rfc8784.
Pełny tekst źródła