Results 61 to 70 of about 1,873 (168)

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem

open access: yesAdvanced Quantum Technologies, Volume 7, Issue 4, April 2024.
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms   +9 more
wiley   +1 more source

Power Analysis on NTRU Prime

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
This paper applies a variety of power analysis techniques to several implementations of NTRU Prime, a Round 2 submission to the NIST PQC Standardization Project.
Wei-Lun Huang   +2 more
doaj   +1 more source

Generic, efficient and isochronous Gaussian sampling over the integers

open access: yesCybersecurity, 2022
Gaussian sampling over the integers is one of the fundamental building blocks of lattice-based cryptography. Among the extensively used trapdoor sampling algorithms, it is ineluctable until now. Under the influence of numerous side-channel attacks, it is
Shuo Sun   +4 more
doaj   +1 more source

Analysis of Atom against quantum attacks

open access: yesIET Quantum Communication, Volume 5, Issue 1, Page 88-102, March 2024.
A cost estimation of Grover’s key search attack on the stream cipher Atom is provided, taking into account circuit depth restrictions specified by NIST’s PQC standardisation process. The quantum circuit of Atom is implemented using QISKIT, and the results are compared with other LFSR‐based stream ciphers, including Grain‐v1, Grain‐128‐AEAD, and Lizard.
Ravi Anand, Rimpa Nandi, Takanori Isobe
wiley   +1 more source

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Machine learning and blockchain technologies for cybersecurity in connected vehicles

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 14, Issue 1, January/February 2024.
Cybersecurity threats and countermeasures for connected vehicles. Abstract Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks for their everyday functions on the road so that safety of passengers and vehicles can be ensured.
Jameel Ahmad   +6 more
wiley   +1 more source

Accelerating ALTEQ With Hardware–Software Co-Design on FPGA

open access: yesIEEE Access
The emergence of quantum computing poses a significant threat to the security of modern public-key cryptography, spurring a global effort to standardize Post-Quantum Cryptography (PQC). However, optimization research has predominantly focused on software
Yongryeol Choi   +6 more
doaj   +1 more source

BCH 부호를 이용한 FrodoKEM의 성능 개선 및 동형 비교를 위한 합성함수에 의한 부호 함수의 미니맥스 근사 [PDF]

open access: yes, 2020
학위논문 (박사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 노종선.In this dissertation, two main contributions are given as; Performance improvement of FrodoKEM using Gray and error-correcting codes (ECCs).
이은상
core  

Home - About - Disclaimer - Privacy