Results 61 to 70 of about 1,873 (168)
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer +5 more
wiley +1 more source
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms +9 more
wiley +1 more source
This paper applies a variety of power analysis techniques to several implementations of NTRU Prime, a Round 2 submission to the NIST PQC Standardization Project.
Wei-Lun Huang +2 more
doaj +1 more source
Generic, efficient and isochronous Gaussian sampling over the integers
Gaussian sampling over the integers is one of the fundamental building blocks of lattice-based cryptography. Among the extensively used trapdoor sampling algorithms, it is ineluctable until now. Under the influence of numerous side-channel attacks, it is
Shuo Sun +4 more
doaj +1 more source
Analysis of Atom against quantum attacks
A cost estimation of Grover’s key search attack on the stream cipher Atom is provided, taking into account circuit depth restrictions specified by NIST’s PQC standardisation process. The quantum circuit of Atom is implemented using QISKIT, and the results are compared with other LFSR‐based stream ciphers, including Grain‐v1, Grain‐128‐AEAD, and Lizard.
Ravi Anand, Rimpa Nandi, Takanori Isobe
wiley +1 more source
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki +2 more
doaj +1 more source
Machine learning and blockchain technologies for cybersecurity in connected vehicles
Cybersecurity threats and countermeasures for connected vehicles. Abstract Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks for their everyday functions on the road so that safety of passengers and vehicles can be ensured.
Jameel Ahmad +6 more
wiley +1 more source
Accelerating ALTEQ With Hardware–Software Co-Design on FPGA
The emergence of quantum computing poses a significant threat to the security of modern public-key cryptography, spurring a global effort to standardize Post-Quantum Cryptography (PQC). However, optimization research has predominantly focused on software
Yongryeol Choi +6 more
doaj +1 more source
BCH 부호를 이용한 FrodoKEM의 성능 개선 및 동형 비교를 위한 합성함수에 의한 부호 함수의 미니맥스 근사 [PDF]
학위논문 (박사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 노종선.In this dissertation, two main contributions are given as; Performance improvement of FrodoKEM using Gray and error-correcting codes (ECCs).
이은상
core

