Post-quantum cryptography
DJ Bernstein, T Lange - Nature, 2017 - nature.com
… This makes Merkle’s very simple signatures excellent candidates for post-quantum
signatures: they have a clear security track record, and computing hash functions is very fast. …
signatures: they have a clear security track record, and computing hash functions is very fast. …
Blockchained post-quantum signatures
K Chalkias, J Brown, M Hearn… - … on Internet of Things …, 2018 - ieeexplore.ieee.org
… signature schemes, we propose BPQS, an extensible post-quantum (PQ) resistant digital
signature … and verification costs as well as signature size. Compared to recent improvements in …
signature … and verification costs as well as signature size. Compared to recent improvements in …
[PDF][PDF] Candidate for practical post-quantum signature scheme
NA Moldovyan, AA Moldovyan - 2020 - dspace.spbu.ru
… FNAA used as algebraic support of the signature scheme. Taking into account such …
post-quantum resistance is applied in this paper for the development of a post-quantum signature …
post-quantum resistance is applied in this paper for the development of a post-quantum signature …
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
… In Section 4, we first overview the general zero-knowledge proof paradigms used to construct
a large subset of the post-quantum exotic signatures we discuss in this work. Our goal here …
a large subset of the post-quantum exotic signatures we discuss in this work. Our goal here …
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
C Cremers, S Düzlü, R Fiedler… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
… In Section V we analyze the finalists to the NIST competition for post-quantum signature
schemes wrt the three security properties beyond unforgeability. We conclude in Section VI. …
schemes wrt the three security properties beyond unforgeability. We conclude in Section VI. …
Security comparisons and performance analyses of post-quantum signature algorithms
… post-quantum digital signature algorithms, and Sect. 2 explains the history of the post-quantum …
In this section, we discuss more related work to our research, including the post-quantum …
In this section, we discuss more related work to our research, including the post-quantum …
Improved non-interactive zero knowledge with applications to post-quantum signatures
… post-quantum” ring and group signatures … post-quantum” NIZKPoK with shorter proof size
than in prior work. We also explored applications of our work in the context of various signature …
than in prior work. We also explored applications of our work in the context of various signature …
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures
… Finally, we show that cache attacks on post-quantum cryptography are not only possible,
but also … The attack recovers the secret signing key after observing roughly 6 000 signature …
but also … The attack recovers the secret signing key after observing roughly 6 000 signature …
Post-quantum zero-knowledge and signatures from symmetric-key primitives
… of practical post-quantum signature schemes. … signature schemes, we make several
contributions of general interest to zero-knowledge proofs both in the classical and post-quantum …
contributions of general interest to zero-knowledge proofs both in the classical and post-quantum …
Post-quantum signatures
J Buchmann, C Coronado, M Döring… - Cryptology ePrint …, 2004 - eprint.iacr.org
… signature schemes. We have to design, implement and standardize postquantum signature
… In Section 2 we explain the practical relevance of digital signatures for IT-Security today. In …
… In Section 2 we explain the practical relevance of digital signatures for IT-Security today. In …
Related searches
- post-quantum signatures blockchained
- post-quantum signatures zero knowledge
- compact post-quantum signatures
- post-quantum signatures identification schemes
- post-quantum signatures hardware
- post-quantum signatures iot devices
- post-quantum cryptography
- post-quantum security
- post-quantum cryptoschemes
- post-quantum perspective
- post-quantum authentication
- post-quantum cryptosystems