Results 91 to 100 of about 2,892 (213)

Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities

open access: yes, 2023
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes.
Aghapour, Saeed   +4 more
core  

English Title: The State of Quantum Computing: Hardware, Algorithms, and Emerging Networks [PDF]

open access: yes
This review article examines the current landscape and recent advancements in quantum computing, emphasizing its roots in quantum mechanics and its growing influence across various computational fields. A thorough analysis of recent literature, including
Singh, Amit
core   +2 more sources

BCH 부호를 이용한 FrodoKEM의 성능 개선 및 동형 비교를 위한 합성함수에 의한 부호 함수의 미니맥스 근사 [PDF]

open access: yes, 2020
학위논문 (박사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 노종선.In this dissertation, two main contributions are given as; Performance improvement of FrodoKEM using Gray and error-correcting codes (ECCs).
이은상
core  

A Quantum-Safe, Interoperable and Decentralized Payment Infrastructure for the Post-Classical Era as a Strategic Framework for Secure Global Transactions [PDF]

open access: yes
The rise of quantum computing introduces a profound threat to existing digital security frameworks, particularly those that underpin modern payment systems.
Mansur, Md Abul
core   +3 more sources

Towards Managing the Migration to Post-Quantum-Cryptography

open access: yes, 2023
As soon as cryptographically relevant quantum computers exist, they can break today's prevalent asymmetric cryptographic algorithms. Organizations (and the IT society) have to plan on migrating to quantum-resilient cryptographic measures, also known as ...
Alnahawi, Nouri   +4 more
core  

Accelerating ALTEQ With Hardware–Software Co-Design on FPGA

open access: yesIEEE Access
The emergence of quantum computing poses a significant threat to the security of modern public-key cryptography, spurring a global effort to standardize Post-Quantum Cryptography (PQC). However, optimization research has predominantly focused on software
Yongryeol Choi   +6 more
doaj   +1 more source

How Companies Address the Threat of Cryptographically Relevant Quantum Computers and Migrate to Post-Quantum Cryptography [PDF]

open access: yes
How companies prepare for the migration to post-quantum cryptography (PQC) remains an open and important question, despite growing awareness of the threat posed by cryptographically relevant quantum computers (CRQCs).
Brettschneider, Jennifer   +2 more
core   +1 more source

Wireless and Fiber-based Post-Quantum Cryptography Secured IPsec Tunnel [PDF]

open access: yes
In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary ...
Abu Bakar, Rana   +6 more
core   +1 more source

High-Performance NTRU Accelerator Using a Direct Memory Access Controller

open access: yesIEEE Access
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim   +2 more
doaj   +1 more source

Quantum-resistant Transport Layer Security [PDF]

open access: yes
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy