Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
TM Fernandez-Carames, P Fraga-Lamas - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things
TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …
popular public-key encryption systems. Such systems are essential for today's Internet …
Survey of promising technologies for quantum drones and networks
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
H Jiang, Z Zhang, L Chen, H Wang, Z Ma - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
With the gradual progress of NIST's post-quantum cryptography standardization, the Round-
1 KEM proposals have been posted for public to discuss and evaluate. Among the IND-CCA …
1 KEM proposals have been posted for public to discuss and evaluate. Among the IND-CCA …
[图书][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
QC-MDPC: a timing attack and a CCA2 KEM
Abstract In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece
cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This …
cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This …
The decoding failure probability of MDPC codes
JP Tillich - 2018 IEEE International Symposium on Information …, 2018 - ieeexplore.ieee.org
Moderate Density Parity Check (MDPC) codes are defined here as codes which have a
parity-check matrix whose row weight is O (√ n) where n is the length n of the code. They …
parity-check matrix whose row weight is O (√ n) where n is the length n of the code. They …
A toolbox for software optimization of QC-MDPC code-based cryptosystems
The anticipated emergence of quantum computers in the foreseeable future drives the
cryptographic community to start considering cryptosystems, which are based on problems …
cryptographic community to start considering cryptosystems, which are based on problems …
DAGS: Key encapsulation using dyadic GS codes
G Banegas, PSLM Barreto, BO Boidje… - Journal of …, 2018 - degruyter.com
Code-based cryptography is one of the main areas of interest for NIST's Post-Quantum
Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation …
Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation …
Optimized polynomial multiplier over commutative rings on FPGAs: A case study on BIKE
In this paper, we present two constant-time FPGA-based polynomial multipliers for post-
quantum secure key encapsulation mechanisms based on quasi-cyclic codes, which are …
quantum secure key encapsulation mechanisms based on quasi-cyclic codes, which are …