Results 41 to 50 of about 1,873 (168)
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang +3 more
doaj +1 more source
ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj +1 more source
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless of the algorithm’s nature.
Jonghyeok Lee +7 more
doaj +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
A Noise Study of the PSW Signature Family: Patching DRS with Uniform Distribution †
At PKC 2008, Plantard et al. published a theoretical framework for a lattice-based signature scheme, namely Plantard−Susilo−Win (PSW). Recently, after ten years, a new signature scheme dubbed the Diagonal Reduction Signature (DRS) scheme was ...
Arnaud Sipasseuth +2 more
doaj +1 more source
English Title: The State of Quantum Computing: Hardware, Algorithms, and Emerging Networks [PDF]
This review article examines the current landscape and recent advancements in quantum computing, emphasizing its roots in quantum mechanics and its growing influence across various computational fields. A thorough analysis of recent literature, including
Singh, Amit
core +2 more sources
This paper presents a quantum image encryption method using QLSTM to enhance chaotic sequences and achieve synchronisation control. The approach improves encryption security and reliability, maintaining high information entropy and complexity under attacks.
Yuebo Wu +3 more
wiley +1 more source

