EDITORIAL “COMPUTATIONAL ASPECTS OF CRITICAL INFRASTRUCTURES SECURITY”, “SECURITY AND POST-QUANTUM CRYPTOGRAPHY”

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Aspects of Practical Quantum Cryptography

Gilles Brassard, Norbert Lütkenhaus, Tal Mor and Barry C. Sanders 1 Département IRO, Université de Montréal, C.P. 6128, succ. centre–ville, Montréal (Québec), Canada H3C 3J7 Helsinki Institute of Physics, P.O.Box 9, 00014 Helsingin yliopisto, Finland Electrical Engineering, University of California at Los Angeles, Los Angeles, CA 90095–1594, USA Department of Physics, Macquarie University, Sydn...

متن کامل

Computational Security for Cryptography

Since the appearance of public-key cryptography in the Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for a long time, the simple fact that a cryptographic algorithm had withstood cryptanalytic attacks for several years was considered as a kind of validation. But some schemes took a long time before being widely studied, and maybe thereafter be...

متن کامل

Some Aspects of Quantum Cryptography and Network Security

Quantum mechanics is the current best description of the world as we know it. Experiments have shown that quantum predictions are accurate up ten places of decimal. In quantum cryptography much work has been devoted to the study of Quantum Key Distribution (QKD). The purpose of QKD is to securely distribute secret keys between the users in a network. As a result, several quantum cryptographic p...

متن کامل

A Note on Quantum Security for Post-Quantum Cryptography

Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical crypto-systems. In response, people proposed post-quantum cryptography based on computational problems that are believed hard even for quantum computers. However, security of these schemes against quantum attacks is elusive. This is because existing security analysis (almost) only deals with cla...

متن کامل

PQCRYPTO Post-Quantum Cryptography for Long-Term Security

This document provides the PQCRYPTO project’s initial recommendations for post-quantum cryptographic algorithms for symmetric encryption, symmetric authentication, public-key encryption, and public-key signatures. These recommendations are chosen for confidence in their long-term security, rather than for efficiency (speed, bandwidth, etc.). Research in the following years should lead to confid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computing

سال: 2020

ISSN: 2312-5381,1727-6209

DOI: 10.47839/ijc.19.2.1766