Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The Nati...
Main Authors: | Sana Farooq, Ayesha Altaf, Faiza Iqbal, Ernesto Bautista Thompson, Debora Libertad Ramírez Vargas, Isabel de la Torre Díez, Imran Ashraf |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-06-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/12/5379 |
Similar Items
-
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
by: Vlad-Florin Drăgoi, et al.
Published: (2024-12-01) -
A new code‐based digital signature based on the McEliece cryptosystem
by: Farshid Haidary Makoui, et al.
Published: (2023-06-01) -
Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures
by: Abdellatif Kichna, et al.
Published: (2023-05-01) -
Complete and Improved FPGA Implementation of Classic McEliece
by: Po-Jen Chen, et al.
Published: (2022-06-01) -
Code-Based Cryptography With Generalized Concatenated Codes for Restricted Error Values
by: Johann-Philipp Thiers, et al.
Published: (2022-01-01)