National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.
Possibilities of post-quantum cryptography
Burda, Patrik ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
With rapidly evolving technologies and a potential threat of quantum computers that could break all of today’s secure communication, there is a need for ways to deal with this threat. This work deals with the analysis of cryptographic schemes resistant to today’s known quantum attacks such as Shore’s algorithm. The work also includes measurement and evaluation of speed and memory usage. Based on the measurement a suitable postquantum scheme is then implemented on smart card.
Possibilities of post-quantum cryptography
Burda, Patrik ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
With rapidly evolving technologies and a potential threat of quantum computers that could break all of today’s secure communication, there is a need for ways to deal with this threat. This work deals with the analysis of cryptographic schemes resistant to today’s known quantum attacks such as Shore’s algorithm. The work also includes measurement and evaluation of speed and memory usage. Based on the measurement a suitable postquantum scheme is then implemented on smart card.
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.