Oct. 19, 2023, 1:11 a.m. | Param Parekh, Paavan Parekh, Sourav Deb, Manish K Gupta

cs.CR updates on arXiv.org arxiv.org

The development of secure cryptographic protocols and the subsequent attack
mechanisms have been placed in the literature with the utmost curiosity.


While sophisticated quantum attacks bring a concern to the classical
cryptographic protocols present in the applications used in everyday life, the
necessity of developing post-quantum protocols is felt primarily.


In post-quantum cryptography, elliptic curve-base protocols are exciting to
the researchers.


While the comprehensive study of elliptic curves over finite fields is well
known, the extended study over finite rings …

applications attack attacks classification cryptographic curiosity development elliptic life literature post-quantum protocols quantum quantum attacks

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States