2023
DOI: 10.1109/tc.2022.3225080
|View full text |Cite
|
Sign up to set email alerts
|

Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
0
0
0
Order By: Relevance
“…A component that solves linear systems modulo 2 is therefore required in various applications. Choosing an optimal approach typically depends on features including the dimension, number of equations, and sparsity; research on this problem is ongoing [35]. While it is unlikely that Mod2VQLS would have a significant enough advantage over block Wiedermann to motivate the expense of developing quantum computers for this purpose, it is much more likely that large-scale quantum computers will become commercially available for a range of applications, and that Mod2VQLS will have particular niches in this environment.…”
Section: Applications Of Mod2vqls and Related Techniquesmentioning
confidence: 99%
“…A component that solves linear systems modulo 2 is therefore required in various applications. Choosing an optimal approach typically depends on features including the dimension, number of equations, and sparsity; research on this problem is ongoing [35]. While it is unlikely that Mod2VQLS would have a significant enough advantage over block Wiedermann to motivate the expense of developing quantum computers for this purpose, it is much more likely that large-scale quantum computers will become commercially available for a range of applications, and that Mod2VQLS will have particular niches in this environment.…”
Section: Applications Of Mod2vqls and Related Techniquesmentioning
confidence: 99%