Results 1 to 10 of about 36,975 (185)

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, Daniel J., Lange, Tanja
semanticscholar   +7 more sources

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]

open access: yesSensors, 2023
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq   +6 more
doaj   +2 more sources

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems.
Aquina N   +9 more
europepmc   +2 more sources

Research on Development Progress and Test Evaluation of Post-Quantum Cryptography. [PDF]

open access: yesEntropy (Basel)
With the rapid development of quantum computing technology, traditional cryptographic systems are facing unprecedented challenges. Post-Quantum Cryptography (PQC), as a new cryptographic technology that can resist attacks from quantum computers, has ...
Zhang M   +6 more
europepmc   +2 more sources

Post-quantum cryptography and the quantum future of cybersecurity. [PDF]

open access: yesPhys Rev Appl
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Liu YK, Moody D.
europepmc   +2 more sources

A Survey of Post-Quantum Cryptography: Start of a New Race

open access: yesCryptography, 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
doaj   +2 more sources

Post-quantum cryptography

open access: yesNature, 2017
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J Bernstein, Tanja Lange
exaly   +4 more sources

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +2 more sources

Post-Quantum Cryptography

open access: yes
Abstract The need for developing post-quantum cryptography, that is to say cryptographic schemes that are believed to remain secure if large-scale quantum computers are developed, is demonstrated by a discussion of the classical and the quantum algorithms for solving the factorization problem. The ongoing process by the US standards body
Sean Murphy, Rachel Player
  +14 more sources

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy