POSTKVANT KRIPTOGRAFIYASINING ASOSIY TAMOYILLARI VA VAZIFALARI
DOI:
https://doi.org/10.70728/conf.v2.i02.030Keywords:
kvant tahdidlari, postkvant kriptografiyasi, kriptografik algoritmlar, NIST standartlari.Abstract
Ushbu tezis postkvant kriptografiyasining asosiy tamoyillari va vazifalariga bag‘ishlangan. Tezis kvant hisoblashning rivojlanishi bilan bog‘liq bo‘lgan tahdidlar va zamonaviy kriptografik tizimlarning zaif tomonlari hamda kvant kompyuterlariga nisbatan qiyin bo‘lgan matematik muammolar asosida yaratilgan postkvant kriptografik usullarga qaratilgan
References
[1] Dam,D.-T.; Tran, T.-H.; Hoang, V.-P.; Pham, C.-K.; Hoang, T.-T. A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography 2023, 7, 40.
[2] Miklós Ajtai and Cynthia Dwork. A public-key cryptosystem with worst-case/average-case equivalence. pages 284–293, 1997.
[3] L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone. Report on post-quantum cryptography. NISTIR 8105, 2016. http://dx.doi.org/10.6028/NIST.IR.8105.
[4] ShiBai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, and Ron Steinfeld. Improved security proofs in lattice-based cryptography: Using the Rényi divergence rather than the statistical distance. pages 3–24, 2015.
[5] NIST. Module-Lattice-Based Key-Encapsulation Mechanism Standard; National Institute of Standards and Technology: Gaithersburg, MD,USA,2024.
[6] Roberto Avanzi, Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lep oint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehlé. CRYSTALS-Kyber– algorithm specifica tions and supporting documentation. Submission to the NIST post quantum project, 2017.
[7] Singh, H. Code-Based Cryptography: Classic McEliece, 2019. Available online: https://www.semanticscholar.org/paper/Code based-Cryptog-raphy:-Classic-McEliece-Singh/09a4bdf55d0ca5046a2cb868ef74dfb1a021a28d