Results 71 to 80 of about 2,892 (213)

Exploring the landscape of post quantum cryptography: a bibliometric analysis of emerging trends and research impact

open access: yesJournal of Big Data
With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of hour to develop Post Quantum cryptography (PQC), or quantum-resistant cryptography.
Taniya Hasija   +3 more
doaj   +1 more source

Раціональний вибір степені підстановок шифру багатоалфавітної заміни та джерела рівномірно розподіленої випадкової послідовності [PDF]

open access: yes, 2018
У сучасному світі спостерігається постійне зростання сфер застосування системах управління технологічними процесами (СУТП), починаючи з енергетики, зв'язку, повітряного та залізничного транспорту й завершуючи високотехнологічними галузями економіки ...
Гулак, Геннадій Миколайович   +1 more
core  

Enhancing Quantum Image Encryption With QLSTM and Chaos Synchronisation Control: A Deep Neural Network Approach

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper presents a quantum image encryption method using QLSTM to enhance chaotic sequences and achieve synchronisation control. The approach improves encryption security and reliability, maintaining high information entropy and complexity under attacks.
Yuebo Wu   +3 more
wiley   +1 more source

A Review on the Advances, Applications, and Future Prospects of Post-Quantum Cryptography in Blockchain and IoT

open access: yesIEEE Access
With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

PQC-HA: A Framework for Prototyping and In-Hardware Evaluation of Post-Quantum Cryptography Hardware Accelerators

open access: yes, 2023
In the third round of the NIST Post-Quantum Cryptography standardization project, the focus is on optimizing software and hardware implementations of candidate schemes.
Heinz, Carsten   +3 more
core  

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Feasibility of Quantum Key Distribution Between Supersonic Aircraft

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security. We first survey the academic literature and identify gaps in research relating to airborne QKD, establishing a foundation for our own study ...
Solomon Raphael McKiernan   +1 more
wiley   +1 more source

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

open access: yesComputers
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei   +3 more
doaj   +1 more source

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 349-359, December 2024.
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley   +1 more source

Home - About - Disclaimer - Privacy