2024
DOI: 10.3390/cryptography8020021
|View full text |Cite
|
Sign up to set email alerts
|

Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography

Gregory Fitzgibbon,
Carlo Ottaviani

Abstract: Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (in principle) solved by the Shor algorithm in polynomial time due to its ability to efficiently solve the discrete logarithm problem, potentially making present infrastructures insecure against a quantum attack. The National Institute of Standards and Technology (N… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
references
References 58 publications
0
0
0
Order By: Relevance