Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments

M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …

Optimized vectorization implementation of crystals-dilithium

J Zheng, H Zhu, Z Song, Z Wang, Y Zhao - arXiv preprint arXiv:2306.01989, 2023 - arxiv.org
CRYSTALS-Dilithium is a lattice-based signature scheme to be standardized by NIST as the
primary post-quantum signature algorithm. In this work, we make a thorough study of …

[HTML][HTML] Analytic review of healthcare software by using quantum computing security techniques

SH Almotiri, M Nadeem, MA Al Ghamdi… - International Journal of …, 2023 - ijfis.org
The core objective of this security research is to ensure that healthcare software (HS) is
secure when operating on a fully functional quantum computer. Developers are constantly …

On the state of post-quantum cryptography migration

N Alnahawi, A Wiesmaier, T Grasmeyer, J Geißler… - 2021 - dl.gi.de
Safeguarding current and future IT security from quantum computers implies more than the
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …

IOSHA-An Enhanced Hash Function for Secure and Efficient Key Generation in CRYSTALS-Dilithium for IoT

R Borhan, MD Hossain, Y Taenaka… - 2024 International …, 2024 - ieeexplore.ieee.org
Quantum computing is rapidly approaching practical implementation, offering
unprecedented processing power and problem-solving capabilities across diverse domains …

Analyze quantum security in software design using fuzzy-AHP

M Nadeem - International Journal of Information Technology, 2024 - Springer
Quantum Security is a conceptual phenomenon of security that uses the quantum
mechanical concept in computing. Superposition and entanglement are the quantum …

NTT software optimization using an extended Harvey butterfly

J Bradbury, N Drucker, M Hillenbrand - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Software implementations of the number-theoretic transform (NTT) method often leverage
Harvey's butterfly to gain speedups. This is the case in cryptographic libraries such as IBM's …