Results 111 to 120 of about 2,892 (213)
In smart home environments, Harvest Now and Decrypt Later (HNDL) attacks pose a significant threat to long-term privacy. Traditional elliptic curve cryptography (ECC)-based authentication systems can be neutralized using the Shor algorithm on quantum ...
Jinseob Kim, Naryun Woo, Jihyeon Ryu
doaj +1 more source
The advancement of quantum computing is increasingly recognized as a significant threat to classical public-key cryptographic systems, triggering a global shift toward Post-Quantum Cryptography (PQC).
Mustafa El Bizri +3 more
doaj +1 more source
A Scalable Containerised Platform for Benchmarking Classical and PostQuantum Cryptographic Algorithms with Parallel Processing and SNMP Monitoring [PDF]
The advent of quantum computing necessitates the evaluation of post-quantum cryptographic (PQC) schemes, complementing existing classical mechanisms. This paper introduces a scalable, containerised benchmarking framework for assessing the efficiency of
Marius Ioan Rusu , Simona-Vasilica Oprea
doaj
PQC tulee, oletko valmis? Katsaus NIST PQC –projektiin ja sen tuloksiin
unknown ...
openaire +1 more source
Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization
Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Jurdak, Raja +2 more
core
A Comprehensive Journey throughout the Development of Post-Quantum Cryptography [PDF]
[EN] This work aims at giving a comprehensive overview of the Post-Quantum Cryptography (PQC) paradigm: from its foundation and importance to its current status of development.
Blanco Chacón, Iván +2 more
core
Post-quantum cryptographic authentication protocol for industrial IoT using lattice-based cryptography. [PDF]
Shahid AB +4 more
europepmc +1 more source
TTEA: designing a quantum-ready and energy-conscious encryption model for secure IoT environments. [PDF]
Abdelaal MA +3 more
europepmc +1 more source
Quantum cryptography and data protection for medical devices before and after they meet Q-Day. [PDF]
Freyer O +3 more
europepmc +1 more source

