Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in industrial settings makes most contemporary systems susceptible to quantum computer-aided attacks. Alternatives exist, among which a family of well-understood schemes with minimal security requirements: hash-based signatures. In addition to being quantum-safe, hash-based signatures are modular, providing long-term security. They are not yet being used in practice. We discuss the reasons for this gap between theory and practice and outline a strategy to bridge it. We then detail our work to realise the described plan
The article describes alternatives to RSA system, resistant to quantum attacks. There are described ...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in in...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
The potential development of large-scale quantum computers is raising concerns among IT and security...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital sig...
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern comm...
Abstract. We show how to extend hash-tree based data signatures to server-assisted personal digital ...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
Digital signatures are widely used in modern communication to guarantee authenticity and transferabi...
The article describes alternatives to RSA system, resistant to quantum attacks. There are described ...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in in...
The use of public key cryptosystems range from securely encrypting emails and files to creating digi...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
The potential development of large-scale quantum computers is raising concerns among IT and security...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital sig...
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern comm...
Abstract. We show how to extend hash-tree based data signatures to server-assisted personal digital ...
In this thesis, we introduce the basics of blockchain systems, cryptosystems, and post-quantum crypt...
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and o...
Digital signatures are widely used in modern communication to guarantee authenticity and transferabi...
The article describes alternatives to RSA system, resistant to quantum attacks. There are described ...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...