4. Conclusion
Cryptography based on Euclidean networks is a branch of so-called post-quantum cryptography. Today, it represents the most promising alternative to the modern cryptography currently in use, the latter becoming obsolete as soon as sufficiently powerful quantum computers are built. Euclidean lattices are mathematical objects with highly interesting algebraic and geometric properties. Their algorithmic applications in cryptography enable the design and analysis of public-key cryptosystems. In particular, it is possible to build encryption and digital signature schemes with proven security, and resistant to quantum attacks. These two types of cryptographic algorithms have been the subject of a standardization process initiated by NIST to select future post-quantum standards. Three of the four algorithms selected from the 69 candidates at the start of the competition are based on cryptography...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference