Search for dissertations about: "Post-quantum cryptography"
Showing result 1 - 5 of 6 swedish dissertations containing the words Post-quantum cryptography.
-
1. Some Notes on Post-Quantum Cryptanalysis
Abstract : Cryptography as it is used today relies on a foundational level on the assumptionthat either the Integer Factoring Problem (IFP) or the DiscreteLogarithm Problem (DLP) is computationally intractable. In the 1990s PeterShor developed a quantum algorithm that solves both problems in polynomialtime. READ MORE
-
2. Decryption Failure Attacks on Post-Quantum Cryptography
Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE
-
3. Side-Channel Analysis of Post-Quantum Cryptographic Algorithms
Abstract : Public key cryptographic schemes used today rely on the intractability of certain mathematical problems that are known to be efficiently solvable with a large-scale quantum computer. To address the need for long-term security, in 2016 NIST started a project for standardizing post-quantum cryptography (PQC) primitives that rely on problems not known to be targets for a quantum computer, such as lattice problems. READ MORE
-
4. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems
Abstract : Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has become one of the key topics in recent cryptographic research. Its ultimate goal is to search for efficient and secure primitives replacing the factoring- and discrete log-based schemes in service that will be broken in polynomial time by Shor’s algorithm. READ MORE
-
5. Cryptographic Tools for Privacy Preservation and Verifiable Randomness
Abstract : Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital communication channel used nowadays. Due to the continuous increase of daily communication among people worldwide, more and more data might be stolen, misused or tampered. READ MORE