Post-Quantum Cryptography (PQC): Generalized ElGamal Cipher over GF (251^ 8)

P Hecht - arXiv preprint arXiv:1702.03587, 2017 - arxiv.org
Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols resistant to
attacks by means of for instance Shor's polynomial time algorithm for numerical field …

Post-Quantum Cryptography: A Zero-Knowledge Authentication Protocol

P Hecht - arXiv preprint arXiv:1703.08630, 2017 - arxiv.org
In this paper, we present a simple bare-bones solution of a Zero-Knowledge authentication
protocol which uses non-commutative algebra and a variation of the generalized symmetric …

[PDF][PDF] A post-quantum set of compact asymmetric protocols using a general linear group

P Hecht - Actas del VIII Congreso Iberoamericano de Seguridad …, 2015 - researchgate.net
This paper presents an original and unified set of compact asymmetric and arbitrated
protocols developed with the same general linear group. As a computational secure one …

Post-Quantum Cryptography: generalized ElGamal cipher over GF (2518)

P Hecht - Theoretical and Applied Informatics, 2016 - yadda.icm.edu.pl
Abstract Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols
resistant to attacks by means of for instance Shor's polynomial time algorithm for numerical …

Improving a Compact Cipher Based on Non Commutative Rings of Quaternion

J Kamlofsky - XXII Congreso Argentino de Ciencias de la …, 2016 - sedici.unlp.edu.ar
Asymmetric cryptography is required to start encrypted communications. Most protocols are
based on modular operations over integer's rings. Many are vulnerable to sub-exponential …

Post-Quantum Cryptography Using Hyper-Complex Numbers

J Kamlofsky, P Hecht - XXIII Congreso Argentino de Ciencias de …, 2017 - sedici.unlp.edu.ar
Encrypted communications are performed using symmetric ciphers, which require
asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously …

Criptografia pós-quântica: comunicação segura usando OpenSSL

IO SILVA - 2024 - ric.cps.sp.gov.br
O objetivo central desse trabalho é explorar e apresentar estratégias eficazes para a
transição gradual de algoritmos criptográficos convencionais para técnicas pós-quânticas …

[PDF][PDF] Códigos, reticulados e aplicações em criptografia

MF Bollauf - 2015 - repositorio.unicamp.br
Essa dissertação possui como objetivo abordar as teorias de códigos e de reticulados e a
aplicação recente destas na proposição de sistemas criptográficos que fazem o uso de …

[PDF][PDF] Post-Quantum Cryptography Using Hyper-Complex Numbers

JAKJP Hecht - academia.edu
Encrypted communications are performed using symmetric ciphers, which require
asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously …

[PDF][PDF] Criptografia Pós-Quântica baseada em Códigos Corretores de Erros

G Santos, R Terada, T Paiva - ime.usp.br
Criptografia Pós-Quântica Baseada em Códigos Corretores de Erros Page 1 Proposta de
Minicurso para a SBSeg 2016 Criptografia Pós-Quântica Baseada em Códigos Corretores …