- document
-
Onkenhout, Job (author)In 2019 a quantum computer performed a highly complex operation in 4 minutes, which would have taken the most powerful supercomputers of today around 10,000 years. Performing calculations unimaginably faster than is currently possible may bring great opportunities, but may implicate a threat to digital communications. Digital communication is...master thesis 2023
- document
-
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author)One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from...journal article 2023
- document
-
Esgin, Muhammed F. (author), Ersoy, O. (author), Kuchta, Veronika (author), Loss, Julian (author), Sakzad, Amin (author), Steinfeld, Ron (author), Yang, Xiangwen (author), Zhao, Raymond K. (author)In this work, we study the blockchain leader election problem. The purpose of such protocols is to elect a leader who decides on the next block to be appended to the blockchain, for each block proposal round. Solutions to this problem are vital for the security of blockchain systems. We introduce an efficient blockchain leader election method...conference paper 2023
- document
-
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, N. (author)The computation power of quantum computers introduces new security threats in Public Key Infrastructure (PKI), a system used by many governments to secure their digital public services and communication. This calls for an inevitable need for governments to be quantum-safe (QS) by modifying their PKI systems to be resistant to the attacks of...conference paper 2022
- document
-
Yorgova, Radinka (author)Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its focus is on developing algorithms that can be used in the current communication systems to secure them against an adversary powered in the (near) future by a quantum computer. A code-based type cryptosystem is a public key cryptosystem that is...master thesis 2021
- document
-
Berendsen, Dan Dan (author)The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitive data the security for these devices is of greater importance. As these devices are connected with the internet being able to have secure communication is crucial. Some of the major aspects for secure communication are identification and message...bachelor thesis 2021
- document
-
Mazzola, Giacomo (author)In the last decade, development in quantum computing has threatened the security of current public-key cryptography. For this reason, the American National Institute of Standards and Technology (NIST) has organized a competition-like process to<br/>standardize new quantum-resistant public-key encryption and digital signature schemes. This...bachelor thesis 2021
- document
-
Feldman, Feldman (author), Cristea-Enache, Matei (author), Dekhuijzen, Lola (author), Mazzola, Giacomo (author)As quantum-resistant cryptosystems will soon benecessary, the NIST has organized a contest aim-ing to its standardization. The proposed schemesmust be evaluated and thoroughly investigated tonotably ensure their security and compare their per-formance. This paper will explore various lattices-based (pqNTRUSign, BLISS, Dilithium, Falcon,qTesla)...bachelor thesis 2021
- document
-
Esgin, Muhammed F. (author), Ersoy, O. (author), Erkin, Z. (author)Adaptor signatures, also known as scriptless scripts, have recently become an important tool in addressing the scalability and interoperability issues of blockchain applications such as cryptocurrencies. An adaptor signature extends a digital signature in a way that a complete signature reveals a secret based on a cryptographic condition. It...conference paper 2020