Results 91 to 100 of about 1,873 (168)

Towards the quantum-safe web: benchmarking post-quantum TLS [PDF]

open access: yes
The transition to a quantum-resistant Internet is a complex process that depends on the integration of post-quantum cryptographic primitives into existing security protocols.
Ferraris, Davide   +3 more
core   +1 more source

Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization

open access: yes
Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Jurdak, Raja   +2 more
core  

Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series

open access: yesIEEE Access
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim   +2 more
doaj   +1 more source

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

open access: yesApplied Sciences
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim   +4 more
doaj   +1 more source

Generation of Fast Finite Field Arithmetic forCortex-M4 with ECDH and SQIsign Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Finite field arithmetic is central to several cryptographic algorithms on embedded devices like the ARM Cortex-M4, particularly for elliptic curve and isogenybased cryptography.
Felix Carvalho Rodrigues   +7 more
doaj   +1 more source

Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective

open access: yes
The machinery of industrial environments was connected to the Internet years ago with the scope of increasing their performance. However, this change made such environments vulnerable against cyber-attacks that can compromise their correct functioning ...
Crespo, Pedro M.   +4 more
core  

Hardware/Software Co-design for Quantum-Resistant Authentication in V2V Communications [PDF]

open access: yes
La autenticación es un servicio de seguridad informática que verifica la identidad antes de otorgar acceso a un sistema. La autenticación puede aplicarse no sólo a usuarios sino también a mensajes.
Eliú Moreno Ramírez
core  

Home - About - Disclaimer - Privacy