Post-quantum wireguard

A Hülsing, KC Ning, P Schwabe… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In this paper we present PQ-WireGuard, a post-quantum variant of the handshake in the
WireGuard VPN protocol (NDSS 2017). Unlike most previous work on post-quantum security …

Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices

K Mansoor, M Afzal, W Iqbal, Y Abbas - Cluster Computing, 2025 - Springer
With the emergence of quantum computers, traditional cryptographic methods are
vulnerable to attacks, emphasizing the need for post-quantum cryptography to secure …

An efficient authenticated key exchange from random self-reducibility on CSIDH

T Kawashima, K Takashima, Y Aikawa… - Information Security and …, 2021 - Springer
SIDH and CSIDH are key exchange protocols based on isogenies and conjectured to be
quantum-resistant. Since the protocols are similar to the classical Diffie–Hellman, they are …

Finite Field Multiplication for Supersingular Isogeny Diffie–Hellman in Post-Quantum Cryptosystems

Y Fazea, F Mohammed, M Alsamman… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
A quantum The computer's operating speed significantly faster than modern computers,
posing a challenge to existing cryptosystems. Post-Quantum Cryptosystems (PQC) is a type …

On the state of post-quantum cryptography migration

N Alnahawi, A Wiesmaier, T Grasmeyer, J Geißler… - 2021 - dl.gi.de
Safeguarding current and future IT security from quantum computers implies more than the
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …

Bridging the reality gap: A benchmark for physical reasoning in general world models with various physical phenomena beyond mechanics

P Zhao, J Xu, N Cheng, H Hu, X Zhang, X Xu… - Expert Systems with …, 2025 - Elsevier
While general world models have demonstrated excellent capability in modeling and
simulating the world through video understanding and generation, their ability to reason …

Isogeny-based cryptography: a promising post-quantum technique

C Peng, J Chen, S Zeadally, D He - IT Professional, 2019 - ieeexplore.ieee.org
Recent advances in quantum computing have made existing public key cryptosystems
vulnerable to enormous security threats. Therefore, numerous efforts have been exploring …

Strongly secure authenticated key exchange from supersingular isogenies

X Xu, H Xue, K Wang, MH Au, S Tian - … on the Theory and Application of …, 2019 - Springer
This paper aims to address the open problem, namely, to find new techniques to design and
prove security of supersingular isogeny-based authenticated key exchange (AKE) protocols …

Post-quantum anonymous one-sided authenticated key exchange without random oracles

R Ishibashi, K Yoneyama - IACR International Conference on Public-Key …, 2022 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common
session key among multiple parties. Usually, PKI-based AKE schemes are designed to …

One-round authenticated group key exchange from isogenies

A Fujioka, K Takashima, K Yoneyama - … QLD, Australia, October 1–4, 2019 …, 2019 - Springer
This paper proposes two one-round authenticated group key exchange protocols from newly
employed cryptographic invariant maps (CIMs): one is secure in the quantum random oracle …