May 26, 2023, 1:19 a.m. | Yuri Lucas Direbieski, Hiroki Tanioka, Kenji Matsuura, Hironori Takeuchi, Masahiko Sano, Tetsushi Ueta

cs.CR updates on arXiv.org arxiv.org

Modern information communications use cryptography to keep the contents of
communications confidential. RSA (Rivest-Shamir-Adleman) cryptography and
elliptic curve cryptography, which are public-key cryptosystems, are widely
used cryptographic schemes. However, it is known that these cryptographic
schemes can be deciphered in a very short time by Shor's algorithm when a
quantum computer is put into practical use. Therefore, several methods have
been proposed for quantum computer-resistant cryptosystems that cannot be
cracked even by a quantum computer. A simple implementation of LWE-based …

analysis attacks communications confidential cryptography elliptic elliptic curve cryptography extension impact information key problem public ring rsa security

More from arxiv.org / cs.CR updates on arXiv.org

Toronto Transit Commission (TTC) - Chief Information Security Officer (CISO)

@ BIPOC Executive Search Inc. | Toronto, Ontario, Canada

Unit Manager for Cyber Security Culture & Competence

@ H&M Group | Stockholm, Sweden

Junior Security Engineer

@ Pipedrive | Tallinn, Estonia

Splunk Engineer (TS/SCI)

@ GuidePoint Security LLC | Huntsville, AL

DevSecOps Engineer, SRE (Top Secret) - 1537

@ Reinventing Geospatial (RGi) | Herndon, VA

Governance, Risk and Compliance (GRC) Lead

@ Leidos | Brisbane, Australia