2021
DOI: 10.3390/cryptography5040038
|View full text |Cite
|
Sign up to set email alerts
|

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Abstract: Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on modular arithmetic to the contemporary cryptosystems based on quantum computing. The emergence of quantum computing poses a major threat to the modern cryptosystems based on modular arithmetic, whereby even the computationally hard problems which constitute the stren… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 68 publications
0
7
0
Order By: Relevance
“…The various PQC primitive-based algorithms shortlisted by the NIST in their third round of competitions are presented in Table 13. 125,[155][156][157] In Table 14, we also…”
Section: • Various Communication Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…The various PQC primitive-based algorithms shortlisted by the NIST in their third round of competitions are presented in Table 13. 125,[155][156][157] In Table 14, we also…”
Section: • Various Communication Protocolsmentioning
confidence: 99%
“…In this section, we are also exploring other PQC‐based primitives in Table 12 124 with NIST shortlisted schemes shown in Figure 8B. The various PQC primitive‐based algorithms shortlisted by the NIST in their third round of competitions are presented in Table 13 125,155‐157 . In Table 14, we also discussed several open‐source tools and packages for PQC.…”
Section: Exploring Further Scopes and Vision In The Pqc For The Sgnmentioning
confidence: 99%
“…However, their security is no longer guaranteed, as effective attack techniques have been disclosed against most variants. On the other hand, the McEliece cryptosystem based on the binary Goppa codes is still considered secure, as efficient attack techniques against it have yet to be disclosed [10].…”
Section: Introductionmentioning
confidence: 99%
“…These algorithms are secure and efficient in the classical computing environment, but they are not safe in the quantum computing environment. Therefore, it is urgent to explore anti-quantum algorithms, such as lattice cryptography [13,14], hash cryptography [15], and code-based cryptography [16]. The BCCLS also needs a more secure signature algorithm to resist quantum attacks empowered by the quantum computer.…”
Section: Introductionmentioning
confidence: 99%