Results 41 to 50 of about 2,892 (213)
Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile +6 more
doaj +1 more source
A Survey of Post-Quantum Cryptography: Start of a New Race
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam +4 more
doaj +1 more source
Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core +1 more source
This work introduces various approaches to include connected three-body terms in unitary many-body theories, focusing a representative example on the driven similarity renormalization group (DSRG).
Evangelista, Francesco A., Li, Chenyang
core +1 more source
A Prototype for evaluating Post-Quantum Cryptography on resource-constrained Hardware with real-world Smart City Sensor Data [PDF]
As the threat of quantum computing to classical cryptography grows, the transition to post-quantum cryptographic (PQC) systems becomes essential—particularly for smart city infrastructures that rely heavily on secure, real-time sensor data.
J. Seedorf +5 more
doaj +1 more source
A Flexible NTT-Based Multiplier for Post-Quantum Cryptography
In this work an NTT-based (Number Theoretic Transform) multiplier for code-based Post-Quantum Cryptography (PQC) is presented, supporting Quasi Cyclic Low/Moderate-Density Parity-Check (QC LDPC/MDPC) codes.
Kristjane Koleci +3 more
doaj +1 more source
Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC [PDF]
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development.
de Jong, Jins +4 more
core +3 more sources
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU
Postquantum cryptography requires a different set of arithmetic routines from traditional public-key cryptography such as elliptic curves. In particular, in each of the lattice-based NISTPQC Key Establishment finalists, every state-ofthe-art optimized ...
Vincent Hwang +6 more
doaj +3 more sources
The transition to post-quantum cryptography (PQC) marks a pivotal shift in ensuring digital security, prompted by the potential of quantum computers to compromise classical systems such as Rivest-Shamir-Adlema and elliptic-curve cryptography. In response,
Quang Dang Truong +3 more
doaj +1 more source
Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices
The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques.
J. Cameron Patterson +2 more
doaj +1 more source

