Recent advances in quantum computing are increasingly jeopardizing the security of cryptosystems currently in widespread use, such as RSA or elliptic-curve signatures. To address this threat, researchers and standardization institutes have accelerated the transition to quantum-resistant cryptosystems, collectively known as Post-Quantum Cryptography (PQC). These PQC schemes present new challenges due to their larger memory and computational footprints and their higher chance of latent vulnerabilities. In this work, we address these challenges by introducing a scheme to upgrade the digital signatures used by security keys to PQC. We introduce a hybrid digital signature scheme based on two building blocks: a classically-secure scheme, ECDSA, ...
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many clas-sica...
With the advances in quantum computing taking place over the last few years, researchers have starte...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Large-scale quantum computers will be able to efficiently solve the mathematical problems of current...
While the current progress in quantum computing opens new opportunities in a wide range of scientifi...
Post-quantum schemes are expected to replace existing public-key schemes within a decade in billions...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
Widely used public key cryptography is threatened by the development of quantum computers. Post-quan...
Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very ...
Modern digital signature schemes can provide more guarantees than the standard notion of(strong) unf...
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols,...
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many clas-sica...
With the advances in quantum computing taking place over the last few years, researchers have starte...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Large-scale quantum computers will be able to efficiently solve the mathematical problems of current...
While the current progress in quantum computing opens new opportunities in a wide range of scientifi...
Post-quantum schemes are expected to replace existing public-key schemes within a decade in billions...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
Widely used public key cryptography is threatened by the development of quantum computers. Post-quan...
Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very ...
Modern digital signature schemes can provide more guarantees than the standard notion of(strong) unf...
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols,...
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many clas-sica...
With the advances in quantum computing taking place over the last few years, researchers have starte...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...