Results 81 to 90 of about 2,892 (213)

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
doaj   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

SDitH in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This work presents the first hardware realisation of the Syndrome-Decodingin-the-Head (SDitH) signature scheme, which is a candidate in the NIST PQC process for standardising post-quantum secure digital signature schemes.
Sanjay Deshpande   +3 more
doaj   +1 more source

Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem

open access: yesAdvanced Quantum Technologies, Volume 7, Issue 4, April 2024.
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms   +9 more
wiley   +1 more source

NIST Post-Quantum Cryptography- A Hardware Evaluation Study [PDF]

open access: yes, 2019
Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer attacks.
Deepraj Soni   +3 more
core  

Analysis of Atom against quantum attacks

open access: yesIET Quantum Communication, Volume 5, Issue 1, Page 88-102, March 2024.
A cost estimation of Grover’s key search attack on the stream cipher Atom is provided, taking into account circuit depth restrictions specified by NIST’s PQC standardisation process. The quantum circuit of Atom is implemented using QISKIT, and the results are compared with other LFSR‐based stream ciphers, including Grain‐v1, Grain‐128‐AEAD, and Lizard.
Ravi Anand, Rimpa Nandi, Takanori Isobe
wiley   +1 more source

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

open access: yesCryptography
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi   +4 more
doaj   +1 more source

Decryption Failure Attacks on Post-Quantum Cryptography [PDF]

open access: yes, 2023
This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the ...
Nilsson, Alexander
core  

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

Home - About - Disclaimer - Privacy