Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
Breaking SIDH in polynomial time
D Robert - Annual International Conference on the Theory and …, 2023 - Springer
Breaking SIDH in Polynomial Time | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
Post-quantum and code-based cryptography—some prospective research directions
C Balamurugan, K Singh, G Ganesan, M Rajarajan - Cryptography, 2021 - mdpi.com
Cryptography has been used from time immemorial for preserving the confidentiality of
data/information in storage or transit. Thus, cryptography research has also been evolving …
data/information in storage or transit. Thus, cryptography research has also been evolving …
CSIDH: an efficient post-quantum commutative group action
We propose an efficient commutative group action suitable for non-interactive key exchange
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …
From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things
TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …
popular public-key encryption systems. Such systems are essential for today's Internet …
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
On the security of supersingular isogeny cryptosystems
We study cryptosystems based on supersingular isogenies. This is an active area of
research in post-quantum cryptography. Our first contribution is to give a very powerful active …
research in post-quantum cryptography. Our first contribution is to give a very powerful active …
Verifiable delay functions from supersingular isogenies and pairings
We present two new Verifiable Delay Functions (VDF) based on assumptions from elliptic
curve cryptography. We discuss both the advantages and drawbacks of our constructions …
curve cryptography. We discuss both the advantages and drawbacks of our constructions …
Post-quantum key exchange for the internet and the open quantum safe project
D Stebila, M Mosca - International Conference on Selected Areas in …, 2016 - Springer
Designing public key cryptosystems that resist attacks by quantum computers is an important
area of current cryptographic research and standardization. To retain confidentiality of …
area of current cryptographic research and standardization. To retain confidentiality of …