The Relevance of Using Post-quantum Cryptography on the Isogenies of Elliptic Curves for Mobile Application Protection

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The article is a brief overview of the relevance of using cryptographic protocols on isogenies of elliptic curves in mobile applications. The article briefly describes the current situation in the field of cryptography that has arisen in connection with the development of a new generation of computer technology, namely, quantum computers. The article describes the stages of standardization of post-quantum cryptography in accordance with the NIST competition. The article contains a comparison of post-quantum algorithms in terms of cryptographic stability and speed, defines of advantages and disadvantages of protocols on isogenies of elliptic curves, and results of studies on the implementation of the protocols on isogenies of elliptic curves on mobile platforms. The main goal of the article is to consider the possibility of using protocols on the isogeny of elliptic curves for practical purposes to protect confidential information in mobile systems and applications.

Cite

CITATION STYLE

APA

Bobrysheva, J., & Zapechnikov, S. (2020). The Relevance of Using Post-quantum Cryptography on the Isogenies of Elliptic Curves for Mobile Application Protection. In Mechanisms and Machine Science (Vol. 80, pp. 99–103). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-33491-8_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free