Results 51 to 60 of about 2,892 (213)

Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions

open access: yesCryptography
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing.
Sang-Yoon Chang, Qaiser Khan
doaj   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs

open access: yesIEEE Access, 2020
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim   +8 more
doaj   +1 more source

Secure Deployment of Smart Meters

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout   +4 more
wiley   +1 more source

Algebraic approaches for solving isogeny problems of prime power degrees

open access: yesJournal of Mathematical Cryptology, 2020
Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach
Takahashi Yasushi   +5 more
doaj   +1 more source

SIKE Channels

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure.
Luca De Feo   +6 more
doaj   +1 more source

NewHope: A Mobile Implementation of a Post-Quantum Cryptographic Key Encapsulation Mechanism [PDF]

open access: yes, 2020
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten widely used asymmetric algorithms, National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography Standardization Project to ...
Switzler, Jessica A.
core   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis

open access: yes, 2023
Quantum computing is emerging as an unprecedented threat to the current state of widely used cryptographic systems. Cryptographic methods that have been considered secure for decades will likely be broken, with enormous impact on the security of ...
Armstrong, Warren   +7 more
core   +1 more source

Integrating Elliptic Curve Encryption and Post‐Quantum Cryptography for Secure VANETs Using Fog Computing and SDN

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper presents a hybrid security framework for vehicular ad hoc networks that combines lightweight elliptic curve cryptography with quantum‐resistant post‐quantum cryptography, coordinated through fog computing and software‐defined networking.
Adi El‐Dalahmeh   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy