搜索结果: 61-75 共查到“军事学 post-quantum”相关记录77条 . 查询时间(0.473 秒)
Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
Post-Quantum Cryptography Public-Key Encryption Learning with Rounding (LWR)
2016/12/7
The Learning with Errors (LWE) is one of the most promising primitive for post-quantum cryptography due to its strong security reduction from the worst-case of NP-hard problems and its lightweight ope...
Speeding up R-LWE post-quantum key exchange
Post-quantum key exchange Ring-LWE software optimization
2016/5/18
Post-quantum cryptography has attracted increased attention in the last couple of years, due to the threat of quantum computers breaking current cryptosystems. In particular, the key size and performa...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications
Cryptographic hash functions second-preimage resistance AES-NI
2016/2/23
Many efficient cryptographic hash function design strategies
have been explored recently, not least because of the SHA-3 competition.
Almost exclusively these design are geared towards good performa...
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
post-quantum learning with errors Transport Layer Security (TLS) key exchange
2016/1/8
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum
computers. We demonstrate the practicality of post-quantum key exchange by constructing ciphersuites...
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical
crypto-systems. In response, people proposed post-quantum cryptography based on computational
pro...
DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
key pre-distribution DTLS lightweight
2016/1/5
The future development of quantum-computers could turn many key agreement algorithms used in the Internet today fully insecure, endangering many applications such as online banking, e-commerce, e-heal...
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Tor Onion routing Forward anonymity
2016/1/5
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted
traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetri...
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Precomputation Post-Quantum Signatures Hash-based Signatures
2015/12/31
Precomputation techniques are useful to improve realtime
performance of complex algorithms at the expense of extra
memory, and extra preparatory computations. This practice is neglected
especially ...
Cryptography from Post-Quantum Assumptions
Post-Quantum Assumptions post-quantum cryptography
2015/12/31
In this thesis we present our contribution in the field of post-quantum cryptography.
We introduce a new notion of weakly Random-Self-Reducible public-key cryptosystem
and show how it can be used to...
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
unconditionally hiding commitments post-quantum lattice-based cryptography
2015/12/29
Commitment schemes are among cryptography’s most important
building blocks. Besides their basic properties, hidingness and
bindingness, for many applications it is important that the schemes applied...
Implementation Attacks on Post-Quantum Cryptographic Schemes
Implementation Attacks Post-Quantum Cryptographic Schemes
2015/12/21
Post-quantum cryptographic schemes have been developed
in the last decade in response to the rise of quantum computers. Fortunately,
several schemes have been developed with quantum resistance.
How...
Post-quantum key exchange - a new hope
Post-quantum key exchange Ring-LWE high-speed software
2015/12/21
Earlier in 2015, Bos, Costello, Naehrig, and Stebila (IEEE
Security & Privacy 2015) proposed an instantiation of Peikert抯 ringlearning-with-errors
(Ring-LWE) based key-exchange protocol (PQCrypto
2...
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
Matsumoto-Imai multivariate public key cryptography differential symmetry
2013/4/18
Multivariate Public Key Cryptography(MPKC) has become one of a few options for security in the quantum model of computing. Though a few multivariate systems have resisted years of effort from the cryp...
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World
Quantum computing signatures encryption post-quantum security chosen ciphertext security
2013/4/18
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we enhance the standard chosen message query model by allowing the adversa...