Results 11 to 20 of about 89,748 (273)

DFT and TD-DFT studies for optoelectronic properties of coumarin based donor-π-acceptor (D-π-A) dyes: applications in dye-sensitized solar cells (DSSCS)

open access: yesHeliyon, 2021
A series of six coumarin based dye derivatives were investigated and their geometry and optoelectronic properties elucidated for suitability in dye-sensitized solar cells (DSSCs) using TD-DFT/B3LYP with 6-31G basis set.
Said A.H. Vuai   +2 more
doaj   +1 more source

Post-quantum Cryptography

open access: yesCommunications of the ACM, 2023
AbstractPost-quantum Cryptography discusses the need for a new generation of cryptography to protect against future quantum computers. The underlying mathematical concept is a one-way function that makes it easy to encrypt but challenging to decrypt without a secret. However, future quantum computers will likely be able to reverse many of these one-way
  +4 more sources

Post-Quantum Cryptography

open access: yes, 2021
This study provides an overview of the current state of affairs on the standardization process of Post-Quantum Cryptography (PQC). It presents the 5 main families of PQ algorithms; viz. code-based, isogeny-based, hash-based, lattice-based and multivariate-based.
Beullens, Ward   +6 more
  +7 more sources

Group Key Management in Internet of Things: A Systematic Literature Review

open access: yesIEEE Access, 2023
IoT networks are gaining popularity in terms of group networks built by sensor nodes and other IoT-related devices. The significance of cryptography protocols for secure communication among nodes in such networks cannot be overstated.
Fouzia Samiullah   +3 more
doaj   +1 more source

Fortifying the Blockchain: A Systematic Review and Classification of Post-Quantum Consensus Solutions for Enhanced Security and Resilience

open access: yesIEEE Access, 2023
The inherent security and computational demands of classical consensus protocols are often presumed impervious to various forms of attack. However, quantum computing advancements present considerable threats to the assumed attack resistance of classical ...
Jorao Gomes   +2 more
doaj   +1 more source

Post-Quantum Cryptography

open access: yes
[ES] Esta tesis resume los resultados de una investigación sobre la criptografía post-cuántica (PQC), que ofrece ideas valiosas para quienes deseen entender sus implicaciones actuales y futuras. Explora el proyecto Open Quantum Safe (OQS) y la razón por la cual el NIST está involucrado en PQC, así como el complejo proceso de transición hacia esta ...
Pranjal, Chaturvedi, Atul
  +13 more sources

O2MD²: A New Post-Quantum Cryptosystem With One-to-Many Distributed Key Management Based on Prime Modulo Double Encapsulation

open access: yesIEEE Access, 2021
Polynomial-time attacks designed to run on quantum computers and capable of breaking RSA and AES are already known. It is imperative to develop quantum-resistant algorithms before quantum computers become available.
Ricardo Neftali Pontaza Rodas   +3 more
doaj   +1 more source

Post-Quantum Blockchain-Based Secure Service Orchestration in Multi-Cloud Networks

open access: yesIEEE Access, 2022
Existing network service provisioning and lifecycle management (LCM) workflows rely on heterogeneous devices from multiple vendors and collaboration between multiple network actors, which can lead to numerous trust management and interoperability issues.
Engin Zeydan   +2 more
doaj   +1 more source

A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain

open access: yesIEEE Access, 2018
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still less. Targeting
Yu-Long Gao   +5 more
doaj   +1 more source

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

Home - About - Disclaimer - Privacy