Results 31 to 40 of about 1,873 (168)

NewHope: A Mobile Implementation of a Post-Quantum Cryptographic Key Encapsulation Mechanism [PDF]

open access: yes, 2020
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten widely used asymmetric algorithms, National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography Standardization Project to ...
Switzler, Jessica A.
core   +1 more source

Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation

open access: yesIEEE Access
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile   +6 more
doaj   +1 more source

Decryption Failure Attacks on Post-Quantum Cryptography [PDF]

open access: yes, 2023
This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the ...
Nilsson, Alexander
core  

Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions

open access: yesCryptography
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing.
Sang-Yoon Chang, Qaiser Khan
doaj   +1 more source

Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention.
Melissa Azouaoui   +3 more
doaj   +3 more sources

A Quantum-Safe, Interoperable and Decentralized Payment Infrastructure for the Post-Classical Era as a Strategic Framework for Secure Global Transactions [PDF]

open access: yes
The rise of quantum computing introduces a profound threat to existing digital security frameworks, particularly those that underpin modern payment systems.
Mansur, Md Abul
core   +7 more sources

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units

open access: yesMathematics, 2020
With the development of the Internet of Things (IoT) and cloud computing technology, various cryptographic systems have been proposed to protect increasing personal information.
SangWoo An, Seog Chung Seo
doaj   +1 more source

Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities

open access: yes, 2023
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes.
Aghapour, Saeed   +4 more
core  

Secure Deployment of Smart Meters

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy