The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by blockchain have been proved using various cryptographic techniques, mainly public key infrastructure and digital signatures. However, the use of generic cryptographic primitives using large prime numbers or elliptic curves with logarithms is going to be an issue with quantum computers as those techniques are vulnerable in post-quantum era. Therefore, the paradigm shift from pre-quantum to the post-quantum era has necessitated new cryptographic developments which are robust against quantum attacks and applicable in blockchain for post-quantum decentralization. Therefor...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
The security of public-key cryptography depends on the computational intractability of some hard pro...
The decentralization and transparency have provided wide acceptance of blockchain technology in vari...
[Abstract] Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in...
Abstract Blockchain technology finds widespread application across various fields due to its key fea...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
Quantum computation represents a threat to many cryptographic protocols in operation today. It has b...
With the advances in quantum computing taking place over the last few years, researchers have starte...
The key cryptographic protocols used to secure the internet and financial transactions of today are ...
The key cryptographic protocols used to secure the internet and financial transactions of today are ...
Cryptography is essential for the security of Internet communication, cars, and implanted medical de...
Post-quantum cryptography is the field of study and development of cryptographic primitives providin...
The latest quantum computers have the ability to solve incredibly complex classical cryptography equ...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
The security of public-key cryptography depends on the computational intractability of some hard pro...
The decentralization and transparency have provided wide acceptance of blockchain technology in vari...
[Abstract] Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in...
Abstract Blockchain technology finds widespread application across various fields due to its key fea...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
Quantum computation represents a threat to many cryptographic protocols in operation today. It has b...
With the advances in quantum computing taking place over the last few years, researchers have starte...
The key cryptographic protocols used to secure the internet and financial transactions of today are ...
The key cryptographic protocols used to secure the internet and financial transactions of today are ...
Cryptography is essential for the security of Internet communication, cars, and implanted medical de...
Post-quantum cryptography is the field of study and development of cryptographic primitives providin...
The latest quantum computers have the ability to solve incredibly complex classical cryptography equ...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
The security of public-key cryptography depends on the computational intractability of some hard pro...