Search for dissertations about: "Post-quantum cryptography"

Showing result 1 - 5 of 6 swedish dissertations containing the words Post-quantum cryptography.

  1. 1. Some Notes on Post-Quantum Cryptanalysis

    Author : Erik Mårtensson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cryptography; Post-quantum cryptography; LWE; BKW; Cryptanalysis; Lattice sieving; SVP; Lattice-based cryptography; Code-based cryptography;

    Abstract : Cryptography as it is used today relies on a foundational level on the assumptionthat either the Integer Factoring Problem (IFP) or the DiscreteLogarithm Problem (DLP) is computationally intractable. In the 1990s PeterShor developed a quantum algorithm that solves both problems in polynomialtime. READ MORE

  2. 2. Decryption Failure Attacks on Post-Quantum Cryptography

    Author : Alexander Nilsson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Post-quantum cryptography; Code-based cryptography; Lattice-based cryptography; side-channel attack;

    Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE

  3. 3. Side-Channel Analysis of Post-Quantum Cryptographic Algorithms

    Author : Kalle Ngo; Johnny Öberg; Ingo Sander; Elena Dubrova; Lejla Batina; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Post-quantum cryptography; Deep learning; LWE LWR-based KEM; Hardware security; Sidokanalsattack; Postkvantkryptering; Djupinlärning; LWE LWR-baserad KEM; Hårdvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : Public key cryptographic schemes used today rely on the intractability of certain mathematical problems that are known to be efficiently solvable with a large-scale quantum computer. To address the need for long-term security, in 2016 NIST started a project for standardizing post-quantum cryptography (PQC) primitives that rely on problems not known to be targets for a quantum computer, such as lattice problems. READ MORE

  4. 4. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems

    Author : Qian Guo; Institutionen för elektro- och informationsteknik; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has become one of the key topics in recent cryptographic research. Its ultimate goal is to search for efficient and secure primitives replacing the factoring- and discrete log-based schemes in service that will be broken in polynomial time by Shor’s algorithm. READ MORE

  5. 5. Cryptographic Tools for Privacy Preservation and Verifiable Randomness

    Author : Carlo Brunetta; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Confidentiality; Verifiable Randomness; Differential Privacy; GDPR; Privacy; Cryptography;

    Abstract : Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital communication channel used nowadays. Due to the continuous increase of daily communication among people worldwide, more and more data might be stolen, misused or tampered. READ MORE