Results 1 to 10 of about 90,314 (284)
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq+6 more
doaj +3 more sources
A Survey of Post-Quantum Cryptography: Start of a New Race [PDF]
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam+4 more
doaj +3 more sources
Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era [PDF]
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto+3 more
doaj +3 more sources
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography [PDF]
The growth of data-driven technologies, 5G, and the Internet pose enormous pressure on underlying information infrastructure [...]
Ivan B. Djordjevic
doaj +5 more sources
Post-Quantum Cryptography [PDF]
In this survey we propose to cover the prose of post-quantum cryptography over classical cryptography. We talk about the various cryptographic methods that are being practiced to safeguard our information. The future of secure communication is expected to be the implementation of quantum-safe cryptographic systems, and that in the post-quantum era, the
Chaturvedi, Atul, Pranjal
arxiv +4 more sources
Post-Quantum Cryptography Neural Network [PDF]
In recent years, quantum computers and Shor's quantum algorithm have been able to effectively solve NP (Non-deterministic Polynomial-time) problems such as prime factorization and discrete logarithm problems, posing a threat to current mainstream ...
Abel C. H. Chen
semanticscholar +4 more sources
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
Pietro Nannipieri+5 more
doaj +3 more sources
Post-Quantum Cryptography [PDF]
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Gauthier Umana, Valérie
core +5 more sources
Post–Quantum Cryptography – A Primer [PDF]
Traditionally, information security needed encryption, authentication, key management, non-repudiation and authorization which were being met using several techniques. Standardization of algorithms by National Institute of Standards and Technology (NIST) has facilitated international communication for banking and information transfer using these ...
P. V. Ananda Mohana
openalex +2 more sources
Post-quantum cryptography [PDF]
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist.
D Johnson+13 more
core +2 more sources