Password-authenticated key exchange from group actions

M Abdalla, T Eisenhofer, E Kiltz, S Kunzweiler… - Annual International …, 2022 - Springer
We present two provably secure password-authenticated key exchange (PAKE) protocols
based on a commutative group action. To date the most important instantiation of isogeny …

Secure messaging application development: Based on post-quantum algorithms CSIDH, Falcon, and AES symmetric key cryptosystem

NQ Luc, TT Nguyen, CH Vu, DH Quach… - … and Computer Software, 2024 - Springer
In this paper, the authors present a technique for developing a secure messaging service
called “CryptoMess” which utilizes the Commutative Supersingular Isogeny Diffie-Hellman …

Developing Secure Messaging Software using Post-Quantum Cryptography

TT Nguyen, NQ Luc, TT Dao - Engineering, Technology & Applied …, 2023 - etasr.com
In this paper, a technique to develop a secure messaging service utilizing a new post-
quantum cryptosystem, termed CryptoMess, is proposed. Commutative Supersingular …

Parallelization of the Shift and Add Reducer

R Swann, JE Stine - 2023 57th Asilomar Conference on Signals …, 2023 - ieeexplore.ieee.org
This paper discusses a novel method for parallelization of a Shift and Add Reducer. This
improvement allows for high levels of parallelization and decreases the number of cycles …

Refining Mosca's Theorem: Risk Management Model for the Quantum Threat Applied to IoT Protocol Security

M Kiviharju - Cyber Security: Critical Infrastructure Protection, 2022 - Springer
Large-scale quantum computation (QC) presents a serious threat to many modern
cryptographic primitives. This has profound implications to the critical information …

Compact Password Authenticated Key Exchange from Group Actions

R Ishibashi, K Yoneyama - Australasian Conference on Information …, 2023 - Springer
At ASIACRYPT 2020, Alamati et al. formalized the framework of group actions for abstracting
isogeny-based cryptosystems. At CRYPTO 2022, Abdalla et al. extended the framework to …

A Supersingular Elliptic Curve Isogeny-Based Quantum Resistant Cryptographic Key Exchange Scheme

J Tom, BA Onyekwelu, NP Anebo… - NIPES-Journal of …, 2024 - journals.nipes.org
In the past decades, cryptographers tried to validate that a cryptographic universe exists by
instantiating its components from concrete computational assumptions. Presently, a large set …

Check for updates Compact Password Authenticated Key Exchange from Group Actions

R Ishibashi, K Yoneyama - … , Brisbane, QLD, Australia, July 5–7 …, 2023 - books.google.com
At ASIACRYPT 2020, Alamati et al. formalized the framework of group actions for abstracting
isogeny-based cryptosystems. At CRYPTO 2022, Abdalla et al. extended the framework to …

[引用][C] 양자컴퓨팅환경에안전한패스워드기반키교환프로토콜의구성

김현서, 이예솔, 황정연 - 한국정보과학회학술발표논문집, 2024 - dbpia.co.kr
요약고속 연산이 가능한 양자 컴퓨터의 등장은 기존 공개키 암호 분야에서는 큰 위협으로
다가오고 있다. ID/PW 로그인 기반 앱 응용서비스, TLS 보안통신, 사물인터넷 네트워크 …