×

Found 22 Documents (Results 1–22)

A performance evaluation of IPsec with post-quantum cryptography. (English) Zbl 07730580

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 249-266 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Modern cryptography. Volume 2. A classical introduction to informational and mathematical principle. (English) Zbl 1520.94001

Financial Mathematics and Fintech. Singapore: Springer (ISBN 978-981-19-7643-8/hbk; 978-981-19-7646-9/pbk; 978-981-19-7644-5/ebook). xi, 191 p., open access (2023).
PDFBibTeX XMLCite
Full Text: DOI

Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates. (English) Zbl 1514.94140

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 33-61 (2021).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Small leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSS. (English) Zbl 1501.94061

Gao, Debin (ed.) et al., Information and communications security. 23rd international conference, ICICS 2021, Chongqing, China, November 19–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12919, 283-300 (2021).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

An algebraic approach to the rank support learning problem. (English) Zbl 1485.94053

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 442-462 (2021).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

On removing rejection conditions in practical lattice-based signatures. (English) Zbl 1485.94129

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 380-398 (2021).
MSC:  94A62 94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Improvements of algebraic attacks for solving the rank decoding and MinRank problems. (English) Zbl 1511.94051

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 507-536 (2020).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

An algebraic attack on rank metric code-based cryptosystems. (English) Zbl 1479.94122

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 64-93 (2020).
MSC:  94A60 81P94 13P10
PDFBibTeX XMLCite
Full Text: DOI arXiv

Evaluating the potential for hardware acceleration of four NTRU-based key encapsulation mechanisms using software/hardware codesign. (English) Zbl 1455.94152

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 23-43 (2019).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

A key recovery attack on MDPC with CCA security using decoding errors. (English) Zbl 1404.94079

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 789-815 (2016).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Efficient algorithms for supersingular isogeny Diffie-Hellman. (English) Zbl 1384.94046

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 572-601 (2016).
MSC:  94A60 14G50 81P94
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum cryptography: state of the art. (English) Zbl 1405.94002

Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 88-108 (2016).
PDFBibTeX XMLCite
Full Text: DOI Link

Practical lattice-based cryptography: a signature scheme for embedded systems. (English) Zbl 1294.94050

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 530-547 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software