Progress in multivariate cryptography: Systematic review, challenges, and research directions

J Dey, R Dutta - ACM Computing Surveys, 2023 - dl.acm.org
Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital
security even in the presence of quantum adversaries. MPKCs derive their security from the …

[PDF][PDF] Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

SE Yunakovsky, M Kot, N Pozhar, D Nabokov… - EPJ Quantum …, 2021 - Springer
Quantum computing technologies pose a significant threat to the currently employed public-
key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …

Improvements of algebraic attacks for solving the rank decoding and MinRank problems

M Bardet, M Bros, D Cabarcas, P Gaborit… - Advances in Cryptology …, 2020 - Springer
In this paper, we show how to significantly improve algebraic techniques for solving the
MinRank problem, which is ubiquitous in multivariate and rank metric code based …

Post-quantum authentication in TLS 1.3: a performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

V Chamola, A Jolfaei, V Chanana, P Parashari… - Computer …, 2021 - Elsevier
Quantum computing is an emerging field that uses the concepts of quantum mechanics to
outperform classical computers. Quantum computing finds plethora of applications in the 5G …

Survey of promising technologies for quantum drones and networks

A Kumar, S Bhatia, K Kaushik, SM Gandhi… - Ieee …, 2021 - ieeexplore.ieee.org
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …

Banquet: short and fast signatures from AES

C Baum, CD de Saint Guilhem, D Kales… - … Conference on Public …, 2021 - Springer
This work introduces Banquet, a digital signature scheme with post-quantum security,
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …

An estimator for the hardness of the MQ problem

E Bellini, RH Makarim, C Sanna, J Verbel - International Conference on …, 2022 - Springer
Abstract The Multivariate Quadratic (MQ) problem consists in finding the solutions of a given
system of m quadratic equations in n unknowns over a finite field, and it is an NP-complete …

Secure IoT in the era of quantum computers—Where are the bottlenecks?

M Schöffel, F Lauer, CC Rheinländer, N Wehn - Sensors, 2022 - mdpi.com
Recent progress in quantum computers severely endangers the security of widely used
public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is …

Signature correction attack on dilithium signature scheme

S Islam, K Mus, R Singh, P Schaumont… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected
to be replaced by post-quantum schemes in the next decade in billions of devices. To …