Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Applied Sciences  /  Vol: 11 Par: 6 (2021)  /  Artículo
ARTÍCULO
TITULO

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

Bertrand Cambou    
Michael Gowanlock    
Bahattin Yildiz    
Dina Ghanaimiandoab    
Kaitlyn Lee    
Stefan Nelson    
Christopher Philabaum    
Alyssa Stenberg and Jordan Wright    

Resumen

Using physical unclonable functions (PUFs), in support of networks secured with a public key infrastructure, to generate, on demand, the key pairs needed for lattice and code PQC algorithms.

 Artículos similares

       
 
Tyler Cultice and Himanshu Thapliyal    
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems.... ver más
Revista: Information

 
Anastasiya Ilyukhina     Pág. 16 - 27
In 2001, a CFS signature scheme based on the Niederreiter cryptosystem was proposed. The signature algorithm is based on code cryptography, which makes the signature resistant to post-quantum attacks. However, there are certain difficulties in its implem... ver más

 
Clara Lei Xin Yong, Rosa Celia Poquita-Du, Danwei Huang and Peter Alan Todd    
There is a growing interest in transplanting corals onto the intertidal section of artificial coastal defences (e.g., seawalls) as an ecological engineering strategy to enhance biodiversity on urban shores. However, this inevitably results in exposure to... ver más

 
Donghoe Heo, Suhri Kim, Young-Ho Park and Seokhie Hong    
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange al... ver más
Revista: Applied Sciences

 
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova     Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec... ver más