Results 101 to 110 of about 2,892 (213)
Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year ...
Manohar Raavi +5 more
doaj +1 more source
Although cryptographic algorithms may be mathematically secure, it is often possible to leak secret information from the implementation of the algorithms.
Erata, Ferhat +3 more
core
Resilience of Post-Quantum Cryptography in Lightweight IoT Protocols: A Systematic Review
The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud communications ...
Mohammed Almutairi, Frederick T. Sheldon
doaj +1 more source
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki +2 more
doaj +1 more source
Towards the quantum-safe web: benchmarking post-quantum TLS [PDF]
The transition to a quantum-resistant Internet is a complex process that depends on the integration of post-quantum cryptographic primitives into existing security protocols.
Ferraris, Davide +3 more
core +1 more source
Compact Hybrid Signature for Secure Transition to Post-Quantum Era
Recent advances in quantum-computing technology have threatened the security of classical cryptographic algorithms. This initiated research on Post-Quantum Cryptography (PQC), and the National Institute of Standards and Technology (NIST) PQC ...
Hee-Yong Kwon, Indra Bajuna, Mun-Kyu Lee
doaj +1 more source
Faster multiplication in ℤ2m[x] on Cortex-M4 to speed up NIST PQC candidates
Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7 ...
Kannwischer, M.J. +2 more
openaire +1 more source
Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to be
Tengfei Wang +4 more
doaj +1 more source
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu +4 more
doaj +1 more source
The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process.
Berat Birgin, Baris Celiktas
doaj +1 more source

