Jan. 26, 2024, 2:10 a.m. | Abel C. H. Chen

cs.CR updates on arXiv.org arxiv.org

In recent years, the elliptic curve Qu-Vanstone (ECQV) implicit certificate
scheme has found application in security credential management systems (SCMS)
and secure vehicle-to-everything (V2X) communication to issue pseudonymous
certificates. However, the vulnerability of elliptic-curve cryptography (ECC)
to polynomial-time attacks posed by quantum computing raises concerns. In order
to enhance resistance against quantum computing threats, various post-quantum
cryptography methods have been adopted as standard (e.g. Dilithium) or
candidate standard methods (e.g. McEliece cryptography), but state of the art
has proven to …

application arxiv attacks certificate certificates chen communication computing credential credential management cryptography curve ecc elliptic everything found issue management management systems order post-quantum post-quantum cryptography quantum quantum computing quantum cryptography scms security systems vehicle vulnerability

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Premium Hub - CoE: Business Process Senior Consultant, SAP Security Role and Authorisations & GRC

@ SAP | Dublin 24, IE, D24WA02

Product Security Response Engineer

@ Intel | CRI - Belen, Heredia

Application Security Architect

@ Uni Systems | Brussels, Brussels, Belgium

Sr Product Security Engineer

@ ServiceNow | Hyderabad, India

Analyst, Cybersecurity & Technology (Initial Application Deadline May 20th, Final Deadline May 31st)

@ FiscalNote | United Kingdom (UK)