May 26, 2023, 1:19 a.m. | Yuri Lucas Direbieski, Hiroki Tanioka, Kenji Matsuura, Hironori Takeuchi, Masahiko Sano, Tetsushi Ueta

cs.CR updates on

Modern information communications use cryptography to keep the contents of
communications confidential. RSA (Rivest-Shamir-Adleman) cryptography and
elliptic curve cryptography, which are public-key cryptosystems, are widely
used cryptographic schemes. However, it is known that these cryptographic
schemes can be deciphered in a very short time by Shor's algorithm when a
quantum computer is put into practical use. Therefore, several methods have
been proposed for quantum computer-resistant cryptosystems that cannot be
cracked even by a quantum computer. A simple implementation of LWE-based …

analysis attacks communications confidential cryptography elliptic elliptic curve cryptography extension impact information key problem public ring rsa security

More from / cs.CR updates on

Toronto Transit Commission (TTC) - Chief Information Security Officer (CISO)

@ BIPOC Executive Search Inc. | Toronto, Ontario, Canada

Unit Manager for Cyber Security Culture & Competence

@ H&M Group | Stockholm, Sweden

Junior Security Engineer

@ Pipedrive | Tallinn, Estonia

Splunk Engineer (TS/SCI)

@ GuidePoint Security LLC | Huntsville, AL

DevSecOps Engineer, SRE (Top Secret) - 1537

@ Reinventing Geospatial (RGi) | Herndon, VA

Governance, Risk and Compliance (GRC) Lead

@ Leidos | Brisbane, Australia