Results 31 to 40 of about 1,873 (168)
NewHope: A Mobile Implementation of a Post-Quantum Cryptographic Key Encapsulation Mechanism [PDF]
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten widely used asymmetric algorithms, National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography Standardization Project to ...
Switzler, Jessica A.
core +1 more source
Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile +6 more
doaj +1 more source
Decryption Failure Attacks on Post-Quantum Cryptography [PDF]
This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the ...
Nilsson, Alexander
core
Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing.
Sang-Yoon Chang, Qaiser Khan
doaj +1 more source
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention.
Melissa Azouaoui +3 more
doaj +3 more sources
A Quantum-Safe, Interoperable and Decentralized Payment Infrastructure for the Post-Classical Era as a Strategic Framework for Secure Global Transactions [PDF]
The rise of quantum computing introduces a profound threat to existing digital security frameworks, particularly those that underpin modern payment systems.
Mansur, Md Abul
core +7 more sources
Blockchain in Communication Networks: A Comprehensive Review
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley +1 more source
With the development of the Internet of Things (IoT) and cloud computing technology, various cryptographic systems have been proposed to protect increasing personal information.
SangWoo An, Seog Chung Seo
doaj +1 more source
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes.
Aghapour, Saeed +4 more
core
Secure Deployment of Smart Meters
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout +4 more
wiley +1 more source

