The use of public key cryptosystems range from securely encrypting emails and files to creating digital signatures for non-repudiation. The security of public key cryptosystems is based on computationally "unsolvable" complex mathematical problems. This tends to change with the introduction of quantum computers that undoubtedly pose a threat to the current schemes. In response to that extensive research has been conducted that resulted in several cryptosystems that are believed to be quantum resistant. This thesis presents a concise overview of multiple hash-based signature schemes and provides a comparative description and analysis of them. The comparisons are based on different signature scheme properties, such as key sizes, signature siz...
One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum...
The potential advent of quantum computers in coming years has motivated security researchers to star...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in in...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern comm...
Data protection and information security have been the essence of communication in today's digital e...
© 2016, Pleiades Publishing, Ltd.In the paper we define a notion of quantum resistant ((δ, є)-resist...
Public-key cryptography is indispensable for cyber security. However, as a result of Peter Shor show...
A common desire in today\u27s world is that of security. Whether it is keeping your e-mail private o...
The aim of this paper is to elucidate the implications of quantum computing in present cryptography ...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
The article describes alternatives to RSA system, resistant to quantum attacks. There are described ...
One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum...
The potential advent of quantum computers in coming years has motivated security researchers to star...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in in...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern comm...
Data protection and information security have been the essence of communication in today's digital e...
© 2016, Pleiades Publishing, Ltd.In the paper we define a notion of quantum resistant ((δ, є)-resist...
Public-key cryptography is indispensable for cyber security. However, as a result of Peter Shor show...
A common desire in today\u27s world is that of security. Whether it is keeping your e-mail private o...
The aim of this paper is to elucidate the implications of quantum computing in present cryptography ...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
The article describes alternatives to RSA system, resistant to quantum attacks. There are described ...
One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum...
The potential advent of quantum computers in coming years has motivated security researchers to star...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...