2021
DOI: 10.48550/arxiv.2112.00399
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Quantum-Resistant Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…However, the computing power of current quantum computers is not sufficiently strong [9,10], therefore there are still has many problems to overcome.…”
Section: Quantum Computermentioning
confidence: 99%
“…However, the computing power of current quantum computers is not sufficiently strong [9,10], therefore there are still has many problems to overcome.…”
Section: Quantum Computermentioning
confidence: 99%
“…Recently, J. P. Mattsson, B. Smeets, and E. Thormarker [39] have provided an excellent survey for the NIST quantum computer-resistant cryptography standardization effort, the migration to quantum-resistant public-key cryptography, and the relevance of QKD as a complement to conventional cryptography. In particular, these algorithms of quantum-resistant public-key cryptography can execute completely in software on classical computers, in contrast to e.g., QKD which requires very expensive custom hardware.…”
Section: Explanation Of Symbolsmentioning
confidence: 99%
“…Although the most prominent effort to identify and examine secure algorithms for post-quantum cryptography (PQC) is the National Institute of Standards and Technology (NIST)’s standardization process ( NIST, 2022 ), institutions and organizations such as European Telecommunications Standards Institute, Internet Engineering Task Force, American National Standards Institute, and International Organization for Standardization are also actively working on to be ready for the post-quantum epoch. In addition, many studies have been carried out on analyzing the security of the constructed proposal using different techniques and current technologies ( Fernández-Caramés, 2019 ; Mattsson, Smeets & Thormarker, 2021 ; Joshi, Bhole & Vaswani, 2022 ; Radanliev, Roure & Santos, 2023 ). Up-to-date studies show that lattice-based schemes are at the forefront of post-quantum secure protocol design due to their strong security assumptions and worst-case hardness properties ( Peikert et al, 2016 ).…”
Section: Introductionmentioning
confidence: 99%