Results 91 to 100 of about 92,027 (211)

Modern Symmetric Cryptography methodologies and its applications [PDF]

open access: yesarXiv, 2009
Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper.
arxiv  

Challenges and opportunities on the horizon of post-quantum cryptography

open access: yesAPL Quantum
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal, Peter J. Curry
semanticscholar   +1 more source

Quantum key distribution through quantum machine learning: a research review

open access: yesFrontiers in Quantum Science and Technology
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj   +1 more source

ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools [PDF]

open access: yes
The correct adoption of cryptography APIs is challenging for mainstream developers, often resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have demonstrated inconsistent performance and remain largely inaccessible to most developers. We investigated the extent to which ChatGPT can detect cryptography misuses and compared its
arxiv   +1 more source

Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories

open access: yes, 2015
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class $A$ of crypto-protocols reduces to protocol class $B$ in a scenario $X$, if for every instance $a$ of $A$,
Aravinda, S.   +3 more
core   +1 more source

Contributions to Lattice–based Cryptography [PDF]

open access: yes, 2023
Post–quantum cryptography (PQC) is a new and fast–growing part of Cryptography. It focuses on developing cryptographic algorithms and protocols that resist quantum adversaries (i.e., the adversaries who have access to quantum computers).
Le, Quoc Huy
core   +1 more source

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
semanticscholar   +1 more source

Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing [PDF]

open access: yesITM Web of Conferences
Quantum cryptography has emerged as a revolutionary technology for ensuring secure communication in the era of quantum computing. While existing research primarily focuses on theoretical frameworks and small-scale experimental setups, significant ...
J Kamalakumari   +5 more
doaj   +1 more source

Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Considering code-based cryptography, quasi-cyclic low-density parity-check (QC-LDPC) codes are foreseen as one of the few solutions to design post-quantum cryptosystems.
Davide Zoni   +2 more
doaj   +1 more source

양자 컴퓨터에 대한 암호학적 알고리즘 [PDF]

open access: yes, 2022
학위논문(박사) -- 서울대학교대학원 : 자연과학대학 수리과학부, 2022. 8. 이훈희.The advent of a quantum mechanical computer presents a clear threat to existing cryptography. On the other hand, the quantum computer also suggests the possibility of a new cryptographic protocol through ...
한민기
core  

Home - About - Disclaimer - Privacy