Results 51 to 60 of about 1,873 (168)
Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module [PDF]
Post-QuantumCryptography(PQC)isregardedasaneffectivewaytoresistattackswithquantum computers. Since National Institute of Standards and Technology (NIST) proposed its PQC standardiza- tion project in 2016, many candidates have been submitted and their ...
Junting Xiao, Tadahiko Ito
core
FPGA implementation of post-quantum DME cryptosystem [PDF]
The rapid development of quantum computing constitutes a significant threat to modern Public-Key Cryptography (PKC). The use of Shor's algorithm with potential powerful quantum computers could easily break the two most widely used public key ...
Imaña Pascual, José Luis +1 more
core +2 more sources
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi +4 more
doaj +1 more source
Feasibility of Quantum Key Distribution Between Supersonic Aircraft
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security. We first survey the academic literature and identify gaps in research relating to airborne QKD, establishing a foundation for our own study ...
Solomon Raphael McKiernan +1 more
wiley +1 more source
Quantum-Resistant Cryptographic Schemes for Secure Communication Networks [PDF]
Not only is quantum computing a game changer but it is also an unprecedented threat to world security in cyberspace. Although quantum systems are expected to transform scientific computing, they are also endangering the very notion of classical ...
Swamy TN
core +2 more sources
Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng +7 more
wiley +1 more source
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan +4 more
doaj +1 more source
Side-Channel Analysis on Post-Quantum Cryptography Algorithms [PDF]
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor\u27s Algorithm.
Teague, Tristen
core +1 more source
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley +1 more source

