Giuseppe Caruso
Post-quantum algorithms support in Trusted Execution Environment.
Rel. Antonio Lioy. Politecnico di Torino, Master of science program in Computer Engineering, 2024
|
Preview |
PDF (Tesi_di_laurea)
- Thesis
Licence: Creative Commons Attribution Non-commercial No Derivatives. Download (2MB) | Preview |
Abstract
With the advent of quantum computing numerous are the benefits and advancements introduced in several fields, but it also poses significant threats to cybersecurity. Current cryptosystems are endangered, given the quantum capabilities that this new technology exploits to perform computation and one of the most critical areas regards the public-key algorithms used, as they are susceptible to attacks due to the existence of Shor's algorithm, which can efficiently factorise large numbers and compute discrete logarithms, security's foundation of these algorithms. Recognizing the need for post-quantum (PQ) security, the National Institute of Standards and Technology (NIST) has issued a Call for Proposals to standardize algorithms that can provide security against both traditional and quantum computers.
Furthermore, the confidential computing concept has also made significant advancements in the last years
Relators
Academic year
Publication type
Number of Pages
Course of studies
Classe di laurea
URI
![]() |
Modify record (reserved for operators) |
