-
Current implementation uses curve25519 ECDH for key exchange and ed25519 for signatures. Although elliptic curve cryptography is not safe against attacks by quantum computers. Can secret handshake be …
-
WDYT? Is this publication in scope?
```
@inproceedings{Bettale_2021,
author = {Bettale, Luk and Montoya, Simon and Renault, Guenael},
booktitle = {2021 Workshop on Fault Detection and Tolerance in C…
-
Add a sentence about post-quantum cryptographic operations – both past and future proof
-
When quantum computers are here signed records in mainline DHT become unreliable since they rely on ECC. Is there a post quantum plan for the protocol?
-
WDYT? Is this publication in scope?
```
@inbook{Gellersen_2021,
author = {Gellersen, Tim and Seker, Okan and Eisenbarth, Thomas},
booktitle = {Post-Quantum Cryptography},
doi = {10.1007/978-3-030-8…
-
There are three components necessary for a post-quantum Zcash:
- a plausibly post-quantum [PPQ] public key encryption scheme;
- reanalysis of symmetric crypto parameter choices against quantum attac…
daira updated
9 months ago
-
My understanding of the protocol is that it currently depends on classical cryptography: FFC or ECC.
Most of algorithms in consideration in the [post-quantum selection process](https://csrc.nist.go…
-
```
What should be implemented?
Threefish cipher with 1024bits block size in cbc...
Why it will be useful?
most probably can survive in era off quantum computers til end of times.
fast...
not use s…
-
The [post-quantum signatures](https://github.com/openpgp-pqc/draft-openpgp-pqc/blob/main/draft-ietf-openpgp-pqc.md) are all SHA-3 based, rpm needs to recognize them. As the actual crypto comes from rp…
-
Instead of AES256 i will feel much safer if a quantum safe algorithm, like KRYSTALS, mixed with AES256 was used.
When i say mixed with, it is because we still don't have suffisant robustness tests do…