National Repository of Grey Literature 14 records found  previous11 - 14  jump to record: Search took 0.01 seconds. 
Postquantum cryptography on FPGA
Kek, Sanjin ; Gerlich, Tomáš (referee) ; Smékal, David (advisor)
Subject of this bachelor thesis is postquantum cryptography on FPGA. Focus of theoretical part is to acquaint the reader with FPGA technology, basic principles of VHDL language, current situation in the field of postquantum cryptography and postquantum digital signing scheme CRYSTALS-Dilithium. Increased attention is paid to this scheme. Algorithms needed for function of the scheme, such as SHAKE, NTT and smaller operations used for public key compression, are described. Practical part contains hardware implementation of expandable output function SHAKE and smaller operations, such as Decompose, UseHint, Power2Round and others.
Possibilities of post-quantum cryptography
Burda, Patrik ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
With rapidly evolving technologies and a potential threat of quantum computers that could break all of today’s secure communication, there is a need for ways to deal with this threat. This work deals with the analysis of cryptographic schemes resistant to today’s known quantum attacks such as Shore’s algorithm. The work also includes measurement and evaluation of speed and memory usage. Based on the measurement a suitable postquantum scheme is then implemented on smart card.
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.
Post-quantum alternative to secure sockets
Behún, Marek ; Kratochvíl, Miroslav (advisor) ; Kofroň, Jan (referee)
The goal of this thesis is to implement a software library that provides a wrapping of real-time socket- like communication into an cryptographic protocol with purpose similar to SSL or TLS, that is secure against an adversary in possession of a quantum computer. Resulting software utilizes the Supersingular Isogeny Diffie Hellman (SIDH) key-exchange algorithm for achieving this level of security, and is simple, portable and independent on system-specific primitives. The thesis gives a concise introduction to the theory on which SIDH is built, targeting the audience of undergraduate students of Computer Science. Powered by TCPDF (www.tcpdf.org)

National Repository of Grey Literature : 14 records found   previous11 - 14  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.