Jan. 26, 2024, 2:10 a.m. | Abel C. H. Chen

cs.CR updates on arXiv.org arxiv.org

In recent years, the elliptic curve Qu-Vanstone (ECQV) implicit certificate
scheme has found application in security credential management systems (SCMS)
and secure vehicle-to-everything (V2X) communication to issue pseudonymous
certificates. However, the vulnerability of elliptic-curve cryptography (ECC)
to polynomial-time attacks posed by quantum computing raises concerns. In order
to enhance resistance against quantum computing threats, various post-quantum
cryptography methods have been adopted as standard (e.g. Dilithium) or
candidate standard methods (e.g. McEliece cryptography), but state of the art
has proven to …

application arxiv attacks certificate certificates chen communication computing credential credential management cryptography curve ecc elliptic everything found issue management management systems order post-quantum post-quantum cryptography quantum quantum computing quantum cryptography scms security systems vehicle vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)