搜索结果: 1-7 共查到“军队指挥学 Quantum Key Exchange”相关记录7条 . 查询时间(0.109 秒)
Post-Quantum Key Exchange on FPGAs
Post-quantum cryptography lattice-based cryptography LWE
2017/7/21
The National Institute of Standards and Technology (NIST) announces the post-quantum crypto project, aiming to select cryptographic standard in the post-quantum era. The key establishment algorithm is...
Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
ARMv8-A NEON ARM Cortex-A53 Post-Quantum Key Exchange
2017/5/5
NewHope and NewHope-Simple are two recently proposed post-quantum key exchange protocols based on the hardness of the Ring-LWE problem. Due to their high security margins and performance, there have b...
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
post-quantum cryptography key exchange implementation
2016/12/8
Designing public key cryptosystems that resist attacks by quantum computers is an important area of current cryptographic research and standardization. To retain confidentiality of today's communicati...
Speeding up R-LWE post-quantum key exchange
Post-quantum key exchange Ring-LWE software optimization
2016/5/18
Post-quantum cryptography has attracted increased attention in the last couple of years, due to the threat of quantum computers breaking current cryptosystems. In particular, the key size and performa...
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
post-quantum learning with errors Transport Layer Security (TLS) key exchange
2016/1/8
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum
computers. We demonstrate the practicality of post-quantum key exchange by constructing ciphersuites...
Post-quantum key exchange - a new hope
Post-quantum key exchange Ring-LWE high-speed software
2015/12/21
Earlier in 2015, Bos, Costello, Naehrig, and Stebila (IEEE
Security & Privacy 2015) proposed an instantiation of Peikert抯 ringlearning-with-errors
(Ring-LWE) based key-exchange protocol (PQCrypto
2...
Quantum readout of Physical Unclonable Functions:Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
Physical Unclonable Functions Remote authentication authenticated Quantum Key Exchange
2009/8/7
Physical Unclonable Functions (PUFs) are physical structures that are hard to clone and
have a unique challenge-response behaviour. The term PUF was coined by Pappu et al. in
2001. That work trigger...