Results 61 to 70 of about 2,892 (213)
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
Case Study: PQC Migration for Android Strongbox Keymaster on Samsung Galaxy Mobile Devices
Advances in quantum computers and their algorithms are significantly changing modern cyber-security systems. Post-Quantum Cryptography (PQC) has been standardized to protect modern security systems from large-scale and reliable quantum computing. However,
Sungmin Lee +3 more
doaj +1 more source
On the Performance and Security of Multiplication in GF(2N)
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger +8 more
doaj +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang +3 more
doaj +1 more source
Тенденції розвитку та особливості забезпечення безпеки сучасних ІОТ-пристроїв [PDF]
Інтернет речей (IoT) все більше входить в наше життя та розширює можливості платформ і пристроїв. За інформацією Gartner до ІоТ щодня підключається понад 5,5 млн. нових «речей».
Бурячок, Володимир Леонідович +1 more
core
Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions [PDF]
Quantum computing poses a significant threat to existing cryptosystems, as Shor's and Grover's algorithms efficiently solve the underlying mathematical problems of classical cryptographic algorithms.
Fernando, Prageeth
core +2 more sources
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
Falcon/Kyber and Dilithium/Kyber Network Stack on Nvidia’s Data Processing Unit Platform [PDF]
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today’s communication.
Arnal I Clemente, Xavi +7 more
core +3 more sources

