May 26, 2023, 1:19 a.m. | Yuri Lucas Direbieski, Hiroki Tanioka, Kenji Matsuura, Hironori Takeuchi, Masahiko Sano, Tetsushi Ueta

cs.CR updates on arXiv.org arxiv.org

Modern information communications use cryptography to keep the contents of
communications confidential. RSA (Rivest-Shamir-Adleman) cryptography and
elliptic curve cryptography, which are public-key cryptosystems, are widely
used cryptographic schemes. However, it is known that these cryptographic
schemes can be deciphered in a very short time by Shor's algorithm when a
quantum computer is put into practical use. Therefore, several methods have
been proposed for quantum computer-resistant cryptosystems that cannot be
cracked even by a quantum computer. A simple implementation of LWE-based …

analysis attacks communications confidential cryptography elliptic elliptic curve cryptography extension impact information key problem public ring rsa security

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Operations Analyst

@ Astranis | San Francisco

Manager - Business continuity Security and Safety.Risk and Compliance

@ MTN | Benin

Cyber Analyst, Digital Forensics Incident Response

@ At-Bay | Canada

Technical Product Manager, AppSec and DevSecOps

@ Penn Interactive | Philadelphia

Experienced Cloud Security Engineer (m/f/d) - Cybersecurity

@ MediaMarktSaturn | Barcelona, ES, 8003