Results 51 to 60 of about 1,873 (168)

Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module [PDF]

open access: yes, 2021
Post-QuantumCryptography(PQC)isregardedasaneffectivewaytoresistattackswithquantum computers. Since National Institute of Standards and Technology (NIST) proposed its PQC standardiza- tion project in 2016, many candidates have been submitted and their ...
Junting Xiao, Tadahiko Ito
core  

FPGA implementation of post-quantum DME cryptosystem [PDF]

open access: yes, 2020
The rapid development of quantum computing constitutes a significant threat to modern Public-Key Cryptography (PKC). The use of Shor's algorithm with potential powerful quantum computers could easily break the two most widely used public key ...
Imaña Pascual, José Luis   +1 more
core   +2 more sources

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

open access: yesCryptography
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi   +4 more
doaj   +1 more source

Feasibility of Quantum Key Distribution Between Supersonic Aircraft

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security. We first survey the academic literature and identify gaps in research relating to airborne QKD, establishing a foundation for our own study ...
Solomon Raphael McKiernan   +1 more
wiley   +1 more source

Quantum-Resistant Cryptographic Schemes for Secure Communication Networks [PDF]

open access: yes
Not only is quantum computing a game changer but it is also an unprecedented threat to world security in cyberspace. Although quantum systems are expected to transform scientific computing, they are also endangering the very notion of classical ...
Swamy TN
core   +2 more sources

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
doaj   +1 more source

Side-Channel Analysis on Post-Quantum Cryptography Algorithms [PDF]

open access: yes, 2022
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor\u27s Algorithm.
Teague, Tristen
core   +1 more source

x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 349-359, December 2024.
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley   +1 more source

Home - About - Disclaimer - Privacy