2020
DOI: 10.1109/access.2020.3040324
|View full text |Cite
|
Sign up to set email alerts
|

Performance of New Hope and CRYSTALS-Dilithium Postquantum Schemes in the Transport Layer Security Protocol

Abstract: In recent years, there has been a notable amount of research on developing cryptographic schemes that are secure against both quantum and classical computers. In 2016, the National Institute of Standards and Technology (NIST) initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public key cryptographic schemes. This process originated because quantum computers can exploit quantum mechanical phenomena and solve mathematical problems that are difficult or intractable for classi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Thus, it is important to evaluate and select the appropriate data masking mechanism based on the specific context and the potential threats and risks to the data. Secure communication protocols: Implementing secure communication protocols, such as transport layer security (TLS) [59]- [61] or secure sockets layer (SSL) [62], is beneficial in safeguarding the model from inversion attacks by preventing unauthorized access to the model and the data it handles.…”
Section: ) Model Inversion Attacksmentioning
confidence: 99%
“…Thus, it is important to evaluate and select the appropriate data masking mechanism based on the specific context and the potential threats and risks to the data. Secure communication protocols: Implementing secure communication protocols, such as transport layer security (TLS) [59]- [61] or secure sockets layer (SSL) [62], is beneficial in safeguarding the model from inversion attacks by preventing unauthorized access to the model and the data it handles.…”
Section: ) Model Inversion Attacksmentioning
confidence: 99%