搜索结果: 1-6 共查到“军队指挥学 post-quantum security”相关记录6条 . 查询时间(0.062 秒)
A voting scheme with post-quantum security based on physical laws
voting scheme no-key protocol post-quantum security
2018/5/22
Traditional cryptography is under huge threat along of the evolution of quantum information and computing. In this paper, we propose a new post-quantum voting scheme based on physical laws by using en...
Post-quantum security of the sponge construction
Post-quantum cryptography hash functions Sponge construction
2017/8/16
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Simpira SPHINCS post-quantum security
2017/7/6
We introduce SPHINCS-Simpira, which is a variant of the SPHINCS signature scheme with Simpira as a building block. SPHINCS was proposed by Bernstein et al. at EUROCRYPT 2015 as a hash-based signature ...
Post-Quantum Security of Fiat-Shamir
quantum cryptography zero knowledge digital signatures
2017/5/11
The Fiat-Shamir construction (Crypto 1986) is an efficient transformation in the random oracle model for creating non-interactive proof systems and signatures from sigma-protocols. In classical crypto...
Collapsing sponges: Post-quantum security of the sponge construction
quantum cryptography hash functions
2017/3/31
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...