Results 61 to 70 of about 2,892 (213)

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Case Study: PQC Migration for Android Strongbox Keymaster on Samsung Galaxy Mobile Devices

open access: yesIEEE Access
Advances in quantum computers and their algorithms are significantly changing modern cyber-security systems. Post-Quantum Cryptography (PQC) has been standardized to protect modern security systems from large-scale and reliable quantum computing. However,
Sungmin Lee   +3 more
doaj   +1 more source

On the Performance and Security of Multiplication in GF(2N)

open access: yesCryptography, 2018
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger   +8 more
doaj   +1 more source

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang   +3 more
doaj   +1 more source

Тенденції розвитку та особливості забезпечення безпеки сучасних ІОТ-пристроїв [PDF]

open access: yes, 2018
Інтернет речей (IoT) все більше входить в наше життя та розширює можливості платформ і пристроїв. За інформацією Gartner до ІоТ щодня підключається понад 5,5 млн. нових «речей».
Бурячок, Володимир Леонідович   +1 more
core  

Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions [PDF]

open access: yes
Quantum computing poses a significant threat to existing cryptosystems, as Shor's and Grover's algorithms efficiently solve the underlying mathematical problems of classical cryptographic algorithms.
Fernando, Prageeth
core   +2 more sources

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Falcon/Kyber and Dilithium/Kyber Network Stack on Nvidia’s Data Processing Unit Platform [PDF]

open access: yes
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today’s communication.
Arnal I Clemente, Xavi   +7 more
core   +3 more sources

Home - About - Disclaimer - Privacy