Literature DB >> 28905891

Post-quantum cryptography.

Daniel J Bernstein1, Tanja Lange2.   

Abstract

Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

Year:  2017        PMID: 28905891     DOI: 10.1038/nature23461

Source DB:  PubMed          Journal:  Nature        ISSN: 0028-0836            Impact factor:   49.962


  1 in total

1.  Roads towards fault-tolerant universal quantum computation.

Authors:  Earl T Campbell; Barbara M Terhal; Christophe Vuillot
Journal:  Nature       Date:  2017-09-13       Impact factor: 49.962

  1 in total
  10 in total

1.  Do cells use passwords in cell-state transitions? Is cell signaling sometimes encrypted?

Authors:  Alex Root
Journal:  Theory Biosci       Date:  2019-06-07       Impact factor: 1.919

2.  Emergent Bioanalogous Properties of Blockchain-based Distributed Systems.

Authors:  Oleg Abramov; Kirstin L Bebell; Stephen J Mojzsis
Journal:  Orig Life Evol Biosph       Date:  2021-08-07       Impact factor: 1.950

3.  A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.

Authors:  Jose-Antonio Septien-Hernandez; Magali Arellano-Vazquez; Marco Antonio Contreras-Cruz; Juan-Pablo Ramirez-Paredes
Journal:  Sensors (Basel)       Date:  2022-01-09       Impact factor: 3.576

4.  Secure multiparty quantum key agreement against collusive attacks.

Authors:  Hussein Abulkasim; Atefeh Mashatan; Shohini Ghose
Journal:  Sci Rep       Date:  2021-05-04       Impact factor: 4.379

5.  A quantum encryption design featuring confusion, diffusion, and mode of operation.

Authors:  Zixuan Hu; Sabre Kais
Journal:  Sci Rep       Date:  2021-12-10       Impact factor: 4.379

6.  SVAT: Secure outsourcing of variant annotation and genotype aggregation.

Authors:  Miran Kim; Su Wang; Xiaoqian Jiang; Arif Harmanci
Journal:  BMC Bioinformatics       Date:  2022-10-01       Impact factor: 3.307

7.  Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging.

Authors:  Muhammad Fahad Khan; Khalid Saleem; Mohammed Ali Alshara; Shariq Bashir
Journal:  Sci Rep       Date:  2021-07-12       Impact factor: 4.379

8.  Analysis of Autoencoders for Network Intrusion Detection.

Authors:  Youngrok Song; Sangwon Hyun; Yun-Gyung Cheong
Journal:  Sensors (Basel)       Date:  2021-06-23       Impact factor: 3.576

9.  Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips.

Authors:  A Di Falco; V Mazzone; A Cruz; A Fratalocchi
Journal:  Nat Commun       Date:  2019-12-20       Impact factor: 14.919

10.  Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems.

Authors:  Santiago Sánchez-Solano; Eros Camacho-Ruiz; Macarena C Martínez-Rodríguez; Piedad Brox
Journal:  Sensors (Basel)       Date:  2022-03-07       Impact factor: 3.576

  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.