Results 21 to 30 of about 65,326 (236)

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography

open access: yesEntropy, 2022
The growth of data-driven technologies, 5G, and the Internet pose enormous pressure on underlying information infrastructure [...]
Ivan B. Djordjevic
doaj   +1 more source

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

open access: yesIEEE Access, 2021
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor   +2 more
doaj   +1 more source

Cryptography and law: The case of Brazil

open access: yesЦифровое право, 2022
In a digitalised environment under conditions of reduced limits and boundaries between physical and virtual worlds, people’s daily activities increasingly migrate to cyberspace.
O. V. Cardoso
doaj   +1 more source

Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare

open access: yesJurnal Rekayasa Elektrika, 2021
Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication ...
Rizka Reza Pahlevi   +2 more
doaj   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

open access: yesEnergies, 2022
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems.
Jongmin Ahn   +7 more
doaj   +1 more source

Secure self-calibrating quantum random bit generator [PDF]

open access: yes, 2006
Random bit generators (RBGs) are key components of a variety of information processing applications ranging from simulations to cryptography. In particular, cryptographic systems require "strong" RBGs that produce high-entropy bit sequences, but ...
A. Stefanov   +9 more
core   +2 more sources

MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM

open access: yesСучасні інформаційні системи, 2022
The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of ...
Bogdan Tomashevsky   +3 more
doaj   +1 more source

Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol

open access: yesFuture Internet, 2022
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions.
Despoina Chochtoula   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy