Towards the quantum-safe web: benchmarking post-quantum TLS [PDF]
The transition to a quantum-resistant Internet is a complex process that depends on the integration of post-quantum cryptographic primitives into existing security protocols.
Ferraris, Davide +3 more
core +1 more source
Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization
Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Jurdak, Raja +2 more
core
Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim +2 more
doaj +1 more source
Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim +4 more
doaj +1 more source
Generation of Fast Finite Field Arithmetic forCortex-M4 with ECDH and SQIsign Applications
Finite field arithmetic is central to several cryptographic algorithms on embedded devices like the ARM Cortex-M4, particularly for elliptic curve and isogenybased cryptography.
Felix Carvalho Rodrigues +7 more
doaj +1 more source
Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network. [PDF]
Wang M, Zhang W, Guo J, Song X, Long G.
europepmc +1 more source
A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World. [PDF]
Cultice T, Clark J, Yang W, Thapliyal H.
europepmc +1 more source
Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective
The machinery of industrial environments was connected to the Internet years ago with the scope of increasing their performance. However, this change made such environments vulnerable against cyber-attacks that can compromise their correct functioning ...
Crespo, Pedro M. +4 more
core
Hardware/Software Co-design for Quantum-Resistant Authentication in V2V Communications [PDF]
La autenticación es un servicio de seguridad informática que verifica la identidad antes de otorgar acceso a un sistema. La autenticación puede aplicarse no sólo a usuarios sino también a mensajes.
Eliú Moreno Ramírez
core
Optimization of the multivariate polynomial public key for quantum safe digital signature. [PDF]
Kuang R, Perepechaenko M.
europepmc +1 more source

