Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
CSIDH: an efficient post-quantum commutative group action
We propose an efficient commutative group action suitable for non-interactive key exchange
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the
conjectured difficulty of finding isogenies between supersingular elliptic curves. The main …
conjectured difficulty of finding isogenies between supersingular elliptic curves. The main …
CSI-FiSh: efficient isogeny based signatures through class group computations
In this paper we report on a new record class group computation of an imaginary quadratic
field having 154-digit discriminant, surpassing the previous record of 130 digits. This class …
field having 154-digit discriminant, surpassing the previous record of 130 digits. This class …
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the
conjectured difficulty of finding isogenies between supersingular elliptic curves. The main …
conjectured difficulty of finding isogenies between supersingular elliptic curves. The main …
From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things
TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …
popular public-key encryption systems. Such systems are essential for today's Internet …
Efficient algorithms for supersingular isogeny Diffie-Hellman
We propose a new suite of algorithms that significantly improve the performance of
supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full …
supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full …
Cryptographic group actions and applications
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
cryptography. Recent works have shown how to build efficient (public-key) primitives from …