Code-based cryptosystems are a promising option for Post-Quantum Cryptography, as neither classical nor quantum algorithms provide polynomial time solvers for their underlying …
A Fujioka, K Takashima, S Terada… - Information Security and …, 2019 - Springer
We propose two authenticated key exchange protocols from supersingular isogenies. Our protocols are the first post-quantum one-round Diffie–Hellman type authenticated key …
K Yoneyama - Proceedings of the 5th ACM Workshop on Security …, 2019 - dl.acm.org
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum …
J Tian, P Wang, Z Liu, J Lin, Z Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Thanks to relatively small public and secret keys, the Supersingular Isogeny Key Encapsulation (SIKE) protocol made it into the third evaluation round of the post-quantum …
(IoT) is quickly encompassing various aspects of our lives. The IoT exists in numerous systems, including consumer product usage and military applications. Many of these and …