Performance Evaluation of Post-Quantum TLS 1.3 on Embedded Systems
暂无分享,去创建一个
Ron Steinfeld | Apostolos P. Fournaris | Amin Sakzad | Raymond K. Zhao | Tasopoulos George | Jinhui Li | Raymond K. Zhao | Ron Steinfeld | A. Sakzad | A. Fournaris | Tasopoulos George | Jinhui Li | George Tasopoulos
[1] Ruben Niederhagen,et al. Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3 , 2022, IACR Cryptol. ePrint Arch..
[2] Michael Devetsikiotis,et al. Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH , 2020, CoNEXT.
[3] Narseo Vallina-Rodriguez,et al. Tracking the deployment of TLS 1.3 on the web , 2020, Comput. Commun. Rev..
[4] Ward Beullens,et al. Improved Cryptanalysis of UOV and Rainbow , 2020, IACR Cryptol. ePrint Arch..
[5] John C. Platt,et al. Quantum supremacy using a programmable superconducting processor , 2019, Nature.
[6] Peter Schwabe,et al. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4 , 2019, IACR Cryptol. ePrint Arch..
[7] Frederik Vercauteren,et al. Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM , 2018, IACR Cryptol. ePrint Arch..
[8] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[9] Damien Stehlé,et al. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[10] Damien Stehlé,et al. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM , 2017, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[11] Narseo Vallina-Rodriguez,et al. Studying TLS Usage in Android Apps , 2018, ANRW.
[12] Douglas Stebila,et al. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project , 2016, SAC.
[13] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[14] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[15] Paul E. Hoffman,et al. SMTP Service Extension for Secure SMTP over Transport Layer Security , 2002, RFC.
[16] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.