Security comparisons and performance analyses of post-quantum signature algorithms
DOI10.1007/978-3-030-78375-4_17zbMATH Open1492.81045OpenAlexW3172955269MaRDI QIDQ2117065FDOQ2117065
Yaroslav Balytskyi, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang, Manohar Raavi, Simeon Wuthier
Publication date: 21 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-78375-4_17
Recommendations
- A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates
- Benchmarking post-quantum cryptography in TLS
- Survey of side-channel attacks and countermeasures on post-quantum cryptography
- Differential power analysis of XMSS and SPHINCS
- Post-quantum cryptography: lattice signatures
quantum computingperformance analysissecurity analysispost-quantum cryptographypublic-key cipherdigital signature algorithmsquantum-resistant cryptography
Cryptography (94A60) Quantum computation (81P68) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62) Computational stability and error-correcting codes for quantum computation and communication processing (81P73)
Cites Work
- Post-quantum key exchange for the Internet and the open quantum safe project
- A method for obtaining digital signatures and public-key cryptosystems
- Title not available (Why is that?)
- Fault-tolerant quantum computation by anyons
- Quantum computational networks
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Unbalanced Oil and Vinegar Signature Schemes
- On Thermal Stability of Topological Qubit in Kitaev's 4D Model
- Rainbow, a New Multivariable Polynomial Signature Scheme
- On thermalization in Kitaev's 2D model
- Improved error bounds for the adiabatic approximation
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Lattice-Based Cryptography
Cited In (3)
Uses Software
This page was built for publication: Security comparisons and performance analyses of post-quantum signature algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117065)