[go: up one dir, main page]

Giron, 2023 - Google Patents

Migrating applications to post-quantum cryptography: Beyond algorithm replacement

Giron, 2023

View PDF
Document ID
10196668331080704547
Author
Giron A
Publication year
Publication venue
Cryptology ePrint Archive

External Links

Snippet

Abstract Post-Quantum Cryptography (PQC) defines cryptographic algorithms designed to resist the advent of the quantum computer. Most public-key cryptosystems today are vulnerable to quantum attackers, so a global-scale transition to PQC is expected. As a result …
Continue reading at eprint.iacr.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
US8555335B2 (en) Securing distributed application information delivery
Paulson Inductive analysis of the internet protocol TLS
Esposito et al. On security in publish/subscribe services: A survey
EP2947840B1 (en) Certificateless multi-agent signature method and apparatus
JP2015503280A (en) A method and apparatus for securing an encryption key in an unsecured computer environment applied to securing and managing virtualization and cloud computing.
Obert et al. Recommendations for trust and encryption in DER interoperability standards
Aruna et al. Cloud to cloud data migration using self sovereign identity for 5G and beyond
Giron Migrating applications to post-quantum cryptography: Beyond algorithm replacement
Cheng An architecture for the Internet Key Exchange protocol
Zhang et al. NDN-MPS: supporting multiparty authentication over named data networking
Fahrenholtz et al. Transactional security for a distributed reputation management system
CN109547413A (en) The access control method of convertible data cloud storage with data source authentication
Borselius Multi-agent system security for mobile communication
Beguinet et al. Formal Verification of a Post-Quantum Signal Protocol with Tamarin
Adelin et al. Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol
Giron et al. Automated issuance of post-quantum certificates: A new challenge
Holstein et al. Trust but verify critical infrastructure cyber security solutions
Lee Guideline for implementing cryptography in the federal government
Giron Data Encryption for the TLS Protocol Against Quantum Adversaries
Giron Hybrid post-quantum cryptography in network protocols
Dharamadhikari et al. Public auditing schemes (pas) for dynamic data in cloud: A review
Ahn et al. mdTLS: How to make middlebox-aware TLS more efficient?
Rudra et al. Understanding and mitigating security and authentication issues in service oriented network architecture
Farshadinia et al. A secure and energy-efficient architecture in Internet of Things–cloud computing network by enhancing and combining three cryptographic techniques via defining new features, areas, and entities: H. Farshadinia et al.
Cánovas et al. AMBAR protocol: Access management based on authorization reduction