Giron, 2023 - Google Patents
Migrating applications to post-quantum cryptography: Beyond algorithm replacementGiron, 2023
View PDF- Document ID
- 10196668331080704547
- Author
- Giron A
- Publication year
- Publication venue
- Cryptology ePrint Archive
External Links
Snippet
Abstract Post-Quantum Cryptography (PQC) defines cryptographic algorithms designed to resist the advent of the quantum computer. Most public-key cryptosystems today are vulnerable to quantum attackers, so a global-scale transition to PQC is expected. As a result …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8555335B2 (en) | Securing distributed application information delivery | |
Paulson | Inductive analysis of the internet protocol TLS | |
Esposito et al. | On security in publish/subscribe services: A survey | |
EP2947840B1 (en) | Certificateless multi-agent signature method and apparatus | |
JP2015503280A (en) | A method and apparatus for securing an encryption key in an unsecured computer environment applied to securing and managing virtualization and cloud computing. | |
Obert et al. | Recommendations for trust and encryption in DER interoperability standards | |
Aruna et al. | Cloud to cloud data migration using self sovereign identity for 5G and beyond | |
Giron | Migrating applications to post-quantum cryptography: Beyond algorithm replacement | |
Cheng | An architecture for the Internet Key Exchange protocol | |
Zhang et al. | NDN-MPS: supporting multiparty authentication over named data networking | |
Fahrenholtz et al. | Transactional security for a distributed reputation management system | |
CN109547413A (en) | The access control method of convertible data cloud storage with data source authentication | |
Borselius | Multi-agent system security for mobile communication | |
Beguinet et al. | Formal Verification of a Post-Quantum Signal Protocol with Tamarin | |
Adelin et al. | Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol | |
Giron et al. | Automated issuance of post-quantum certificates: A new challenge | |
Holstein et al. | Trust but verify critical infrastructure cyber security solutions | |
Lee | Guideline for implementing cryptography in the federal government | |
Giron | Data Encryption for the TLS Protocol Against Quantum Adversaries | |
Giron | Hybrid post-quantum cryptography in network protocols | |
Dharamadhikari et al. | Public auditing schemes (pas) for dynamic data in cloud: A review | |
Ahn et al. | mdTLS: How to make middlebox-aware TLS more efficient? | |
Rudra et al. | Understanding and mitigating security and authentication issues in service oriented network architecture | |
Farshadinia et al. | A secure and energy-efficient architecture in Internet of Things–cloud computing network by enhancing and combining three cryptographic techniques via defining new features, areas, and entities: H. Farshadinia et al. | |
Cánovas et al. | AMBAR protocol: Access management based on authorization reduction |