Post-quantum cryptography on FPGA based on isogenies on elliptic curves

B Koziel, R Azarderakhsh… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… of upcoming plans to require postquantum cryptosystems for all future US … deploy post-quantum
cryptosystems [3]. Isogeny-based cryptography is a method of designing cryptosystems

[PDF][PDF] Elliptic curve cryptography: Pre and post quantum

J Wohlwend - Recuperado de http://math. mit. edu/∼ apost …, 2016 - www-math.mit.edu
… its standard suite B algorithm for both encryption and signature and its use on … Elliptic curves
are the main focus of this paper, which offers a primer to modern elliptic curve cryptography

Post-quantum elliptic curve cryptography

V Soukharev - 2016 - uwspace.uwaterloo.ca
… new schemes for post-quantum cryptography based on isogenies over elliptic curves. For …
’s scheme for encryption using isogenies over ordinary elliptic curves, which represents the …

Post quantum cryptography (pqc)-an overview

M Kumar, P Pattnaik - … High Performance Extreme Computing …, 2020 - ieeexplore.ieee.org
… Abstract—We discuss the Post Quantum Cryptography algo… underlying the algorithm’s
cryptographic strength, the algebraic … for Elliptic Curves, and a class of elliptic curves called …

Demystifying cryptography behind blockchains and a vision for post-quantum blockchains

AH Lone, R Naaz - 2020 IEEE International Conference for …, 2020 - ieeexplore.ieee.org
… of post-quantum cryptographic primitives for post-quantum Blockchains. Keywords—… these
operations on elliptic curve under real number space. Elliptic curves have some interesting …

Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications

R Harkanson, Y Kim - Proceedings of the 12th annual conference on …, 2017 - dl.acm.org
… a post-quantum computing world will be discussed later on in this paper. Elliptic curves, when
used for cryptography, … When combined with modular arithmetic, curves lend themselves to …

Post-quantum cryptography: Challenges and opportunities for robust and secure HW design

D Bellizia, N El Mrabet, AP Fournaris… - … on Defect and fault …, 2021 - ieeexplore.ieee.org
elliptic curves and isogenies using [36]. The latter is presented for cryptography use in [37]. …
Post-Quantum Cryptography is a challenging application that is putting a lot of expectations …

[图书][B] Report on post-quantum cryptography

L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta… - 2016 - nvlpubs.nist.gov
… Currently, these functionalities are primarily implemented using Diffie-Hellman key exchange,
the RSA (RivestShamir-Adleman) cryptosystem, and elliptic curve cryptosystems. The …

Post-quantum cryptography

DJ Bernstein, T Lange - Nature, 2017 - nature.com
Post-quantum cryptography is cryptography under the assumption that the attacker has a large
quantum computer; post-quantum cryptosystems … points on an elliptic curve mod p breaks …

A comparison of security and its performance for key agreements in post-quantum cryptography

F Borges, PR Reis, D Pereira - IEEE Access, 2020 - ieeexplore.ieee.org
… for the types of cryptographic systems considered safe against quantum … Post-Quantum
Standardization Process, namely isogeny cryptosystems based on supersingular elliptic curves