Oct. 26, 2023, 12:48 p.m. |

IACR News www.iacr.org

ePrint Report: PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme

Abel C. H. Chen


In recent years, the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme has found application in security credential management systems (SCMS) and secure vehicle-to-everything (V2X) communication to issue pseudonymous certificates. However, the vulnerability of elliptic-curve cryptography (ECC) to polynomial-time attacks posed by quantum computing raises concerns. In order to enhance resistance against quantum computing threats, various post-quantum cryptography methods have been adopted as standard (e.g. Dilithium) or candidate …

application attacks certificate certificates chen communication credential credential management cryptography curve ecc elliptic eprint report found issue management management systems post-quantum post-quantum cryptography quantum quantum cryptography report scms security systems vehicle vulnerability

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote