Cargando…
Modelling and verification of post-quantum key encapsulation mechanisms using Maude
Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum compu...
Autores principales: | García, Víctor, Escobar, Santiago, Ogata, Kazuhiro, Akleylek, Sedat, Otmani, Ayoub |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10557524/ https://www.ncbi.nlm.nih.gov/pubmed/37810329 http://dx.doi.org/10.7717/peerj-cs.1547 |
Ejemplares similares
-
Hybrid post-quantum Transport Layer Security formal analysis in Maude-NPA and its parallel version
por: Tran, Duong Dinh, et al.
Publicado: (2023) -
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
por: Seyhan, Kübra, et al.
Publicado: (2023) -
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
por: Tuncay, Gökhan, et al.
Publicado: (2023) -
Transport Layer Security 1.0 handshake protocol formal verification case study: How to use a proof script generator for existing large proof scores
por: Tran, Duong Dinh, et al.
Publicado: (2023) -
A secure key dependent dynamic substitution method for symmetric cryptosystems
por: Ejaz, Aisha, et al.
Publicado: (2021)