Transitioning organizations to post-quantum cryptography

D Joseph, R Misoczki, M Manzano, J Tricot… - Nature, 2022 - nature.com
Quantum computers are expected to break modern public key cryptography owing to Shor's
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …

Improving the performance of the picnic signature scheme

D Kales, G Zaverucha - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Picnic is a digital signature algorithm designed to provide security against attacks by
quantum computers. The design uses only symmetric-key primitives, and is an efficient …

Ab-pake: Achieving fine-grained access control and flexible authentication

M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …

Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key

J Jiang, D Wang, G Zhang, Z Chen - European Symposium on Research …, 2022 - Springer
Passwords are the most prevalent authentication mechanism, and proliferate on nearly
every new web service. As users are overloaded with the tasks of managing dozens even …

Efficient FPGA implementations of LowMC and Picnic

D Kales, S Ramacher, C Rechberger, R Walch… - Topics in Cryptology–CT …, 2020 - Springer
Post-quantum cryptography has received increased attention in recent years, in particular,
due to the standardization effort by NIST. One of the second-round candidates in the NIST …

A new decryption failure attack against HQC

Q Guo, T Johansson - International Conference on the Theory and …, 2020 - Springer
Abstract HQC is an IND-CCA2 KEM running for standardization in NIST's post-quantum
cryptography project and has advanced to the second round. It is a code-based scheme in …

[КНИГА][B] Post-quantum key exchange mechanism for safety critical systems

T Fritzmann, J Vith, J Sepúlveda - 2019 - hss-opus.ub.ruhr-uni-bochum.de
The high degree of automation demanded in the automotive industry has turned vehicles
into powerful mobile computing platforms. Various types of data are collected, distributed …

Quantifying risks in cryptographic selection processes

DJ Bernstein - Cryptology ePrint Archive, 2023 - eprint.iacr.org
There appears to be a widespread belief that some processes of selecting cryptosystems
are less risky than other processes. As a case study of quantifying the difference in risks, this …

Decomposition of Quaternion-Like Algebras into a Set of Commutative Subalgebras

MT Duong, AA Moldovyan, DN Moldovyan… - … Conference on Future …, 2024 - Springer
Algebraic digital signature algorithms with a hidden group, which are based on the
computational difficulty of finding a solution to a system of many quadratic equations with …

A novel classical and quantum cryptographic scheme for data encryption

P Nimbe, BA Weyori, AF Adekoya - International Journal of Theoretical …, 2022 - Springer
The protection of data is essential in this digitized world and hence the need for
cryptographic techniques to aid in this process. Cryptography in general helps achieve three …