EDITORIAL “COMPUTATIONAL ASPECTS OF CRITICAL INFRASTRUCTURES SECURITY”, “SECURITY AND POST-QUANTUM CRYPTOGRAPHY”
نویسندگان
چکیده
منابع مشابه
Security Aspects of Practical Quantum Cryptography
Gilles Brassard, Norbert Lütkenhaus, Tal Mor and Barry C. Sanders 1 Département IRO, Université de Montréal, C.P. 6128, succ. centre–ville, Montréal (Québec), Canada H3C 3J7 Helsinki Institute of Physics, P.O.Box 9, 00014 Helsingin yliopisto, Finland Electrical Engineering, University of California at Los Angeles, Los Angeles, CA 90095–1594, USA Department of Physics, Macquarie University, Sydn...
متن کاملComputational Security for Cryptography
Since the appearance of public-key cryptography in the Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for a long time, the simple fact that a cryptographic algorithm had withstood cryptanalytic attacks for several years was considered as a kind of validation. But some schemes took a long time before being widely studied, and maybe thereafter be...
متن کاملSome Aspects of Quantum Cryptography and Network Security
Quantum mechanics is the current best description of the world as we know it. Experiments have shown that quantum predictions are accurate up ten places of decimal. In quantum cryptography much work has been devoted to the study of Quantum Key Distribution (QKD). The purpose of QKD is to securely distribute secret keys between the users in a network. As a result, several quantum cryptographic p...
متن کاملA Note on Quantum Security for Post-Quantum Cryptography
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical crypto-systems. In response, people proposed post-quantum cryptography based on computational problems that are believed hard even for quantum computers. However, security of these schemes against quantum attacks is elusive. This is because existing security analysis (almost) only deals with cla...
متن کاملPQCRYPTO Post-Quantum Cryptography for Long-Term Security
This document provides the PQCRYPTO project’s initial recommendations for post-quantum cryptographic algorithms for symmetric encryption, symmetric authentication, public-key encryption, and public-key signatures. These recommendations are chosen for confidence in their long-term security, rather than for efficiency (speed, bandwidth, etc.). Research in the following years should lead to confid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2020
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.19.2.1766