Results 51 to 60 of about 371 (175)
CRYPHTOR: A Memory-Unified NTT-Based Hardware Accelerator for Post-Quantum CRYSTALS Algorithms
This paper presents the design and FPGA implementation of a hardware accelerator for the Post-Quantum CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms, named CRYPHTOR (CRYstals Polynomial HW acceleraTOR).
Stefano Di Matteo +2 more
doaj +1 more source
Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat +3 more
wiley +1 more source
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
Pietro Nannipieri +5 more
doaj +1 more source
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley +1 more source
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA
Post-quantum cryptosystems should be prepared before the advent of powerful quantum computers to ensure information secure in our daily life. In 2016 a post-quantum standardization contest was launched by National Institute of Standards and Technology ...
Yufei Xing, Shuguo Li
doaj +1 more source
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms +9 more
wiley +1 more source
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa +2 more
doaj +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source

