Oct. 19, 2023, 1:11 a.m. | Param Parekh, Paavan Parekh, Sourav Deb, Manish K Gupta

cs.CR updates on arXiv.org arxiv.org

The development of secure cryptographic protocols and the subsequent attack
mechanisms have been placed in the literature with the utmost curiosity.


While sophisticated quantum attacks bring a concern to the classical
cryptographic protocols present in the applications used in everyday life, the
necessity of developing post-quantum protocols is felt primarily.


In post-quantum cryptography, elliptic curve-base protocols are exciting to
the researchers.


While the comprehensive study of elliptic curves over finite fields is well
known, the extended study over finite rings …

applications attack attacks classification cryptographic curiosity development elliptic life literature post-quantum protocols quantum quantum attacks

QA Customer Response Engineer

@ ORBCOMM | Sterling, VA Office, Sterling, VA, US

Enterprise Security Architect

@ Booz Allen Hamilton | USA, TX, San Antonio (3133 General Hudnell Dr) Client Site

DoD SkillBridge - Systems Security Engineer (Active Duty Military Only)

@ Sierra Nevada Corporation | Dayton, OH - OH OD1

Senior Development Security Analyst (REMOTE)

@ Oracle | United States

Software Engineer - Network Security

@ Cloudflare, Inc. | Remote

Software Engineer, Cryptography Services

@ Robinhood | Toronto, ON