Hybrid Post-quantum Signatures in Hardware Security Keys.
Diana GhineaFabian KaczmarczyckJennifer PullmanJulien CretinStefan KölblRafael MisoczkiJean Michel PicodLuca InvernizziElie BurszteinPublished in: ACNS Workshops (2023)
Keyphrases
- private key
- low cost
- hardware and software
- random number generator
- real time
- key agreement
- signature scheme
- intrusion detection
- access control
- security issues
- security requirements
- statistical databases
- key establishment
- security properties
- hardware implementation
- embedded systems
- digital signature
- information security
- public key
- security analysis
- massively parallel
- trusted computing
- elliptic curve
- key management
- security mechanisms
- security policies
- image encryption
- public key cryptosystem
- malware detection
- key distribution
- signature verification
- data integrity
- sensitive data
- computing systems
- data acquisition