Results 21 to 30 of about 65,326 (236)
THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria +3 more
doaj +1 more source
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
The growth of data-driven technologies, 5G, and the Internet pose enormous pressure on underlying information infrastructure [...]
Ivan B. Djordjevic
doaj +1 more source
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor +2 more
doaj +1 more source
Cryptography and law: The case of Brazil
In a digitalised environment under conditions of reduced limits and boundaries between physical and virtual worlds, people’s daily activities increasingly migrate to cyberspace.
O. V. Cardoso
doaj +1 more source
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare
Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication ...
Rizka Reza Pahlevi +2 more
doaj +1 more source
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems.
Jongmin Ahn +7 more
doaj +1 more source
Secure self-calibrating quantum random bit generator [PDF]
Random bit generators (RBGs) are key components of a variety of information processing applications ranging from simulations to cryptography. In particular, cryptographic systems require "strong" RBGs that produce high-entropy bit sequences, but ...
A. Stefanov +9 more
core +2 more sources
MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM
The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of ...
Bogdan Tomashevsky +3 more
doaj +1 more source
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions.
Despoina Chochtoula +3 more
doaj +1 more source

