Security comparisons and performance analyses of post-quantum signature algorithms
From MaRDI portal
Publication:2117065
quantum computingperformance analysissecurity analysispost-quantum cryptographypublic-key cipherdigital signature algorithmsquantum-resistant cryptography
Cryptography (94A60) Quantum computation (81P68) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62) Computational stability and error-correcting codes for quantum computation and communication processing (81P73)
Recommendations
- A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates
- Benchmarking post-quantum cryptography in TLS
- Survey of side-channel attacks and countermeasures on post-quantum cryptography
- Differential power analysis of XMSS and SPHINCS
- Post-quantum cryptography: lattice signatures
Cites work
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- Fault-tolerant quantum computation by anyons
- Improved error bounds for the adiabatic approximation
- Lattice-Based Cryptography
- On thermal stability of topological qubit in Kitaev's 4D model
- On thermalization in Kitaev's 2D model
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Post-quantum key exchange for the Internet and the open quantum safe project
- Quantum computational networks
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Unbalanced Oil and Vinegar Signature Schemes
Cited in
(9)- Secure boot in post-quantum era (invited paper)
- Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation
- QUIC protocol with post-quantum authentication
- Layering quantum-resistance into classical digital signature algorithms
- Full Post-Quantum datagram TLS handshake in the Internet of Things
- Survey of side-channel attacks and countermeasures on post-quantum cryptography
- Transitioning to a quantum-resistant public key infrastructure
- Benchmarking post-quantum cryptography in TLS
- A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates
This page was built for publication: Security comparisons and performance analyses of post-quantum signature algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117065)