SE Yunakovsky, M Kot, N Pozhar, D Nabokov… - EPJ Quantum …, 2021 - Springer
Quantum computing technologies pose a significant threat to the currently employed public- key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …
In this paper, we show how to significantly improve algebraic techniques for solving the MinRank problem, which is ubiquitous in multivariate and rank metric code based …
D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT and security research professionals due to their ability to solve (elliptic curve) discrete …
V Chamola, A Jolfaei, V Chanana, P Parashari… - Computer …, 2021 - Elsevier
Quantum computing is an emerging field that uses the concepts of quantum mechanics to outperform classical computers. Quantum computing finds plethora of applications in the 5G …
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs), and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …
This work introduces Banquet, a digital signature scheme with post-quantum security, constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
Abstract The Multivariate Quadratic (MQ) problem consists in finding the solutions of a given system of m quadratic equations in n unknowns over a finite field, and it is an NP-complete …
M Schöffel, F Lauer, CC Rheinländer, N Wehn - Sensors, 2022 - mdpi.com
Recent progress in quantum computers severely endangers the security of widely used public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is …
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected to be replaced by post-quantum schemes in the next decade in billions of devices. To …