Results 131 to 140 of about 36,975 (185)
BBAS: A blockchain-based authentication system for e-health with multi-factor authentication, access control, and post-quantum security. [PDF]
Latif R +4 more
europepmc +1 more source
Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems. [PDF]
Şahin CB.
europepmc +1 more source
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Transitioning organizations to post-quantum cryptography
Nature, 2022Quantum computers are expected to break modern public key cryptography owing to Shor's algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant algorithms, also known as post-quantum cryptography (PQC) algorithms. The PQC research field has flourished over the past two decades, leading to the creation of a large variety of ...
David Joseph
exaly +4 more sources
2020
For the last few chapters, we have kept a focus on quantum key distribution, or QKD. This maturing technology is still going to be relevant for a long time. What's going to come with it is known as post-quantum cryptography, which will be the main topic for this chapter.
Jonathan Katz, Yehuda Lindell
+4 more sources
For the last few chapters, we have kept a focus on quantum key distribution, or QKD. This maturing technology is still going to be relevant for a long time. What's going to come with it is known as post-quantum cryptography, which will be the main topic for this chapter.
Jonathan Katz, Yehuda Lindell
+4 more sources
High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography
IEEE Symposium on Computer Arithmetic, 2021This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar +2 more
semanticscholar +1 more source
2019
The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and compatible with existing communication protocols and networks. Quantum computing is a winsome field that deals with theoretical computational systems combining visionary ideas of computer science, physics, and ...
Amandeep Singh Bhatia, Ajay Kumar
openaire +2 more sources
The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and compatible with existing communication protocols and networks. Quantum computing is a winsome field that deals with theoretical computational systems combining visionary ideas of computer science, physics, and ...
Amandeep Singh Bhatia, Ajay Kumar
openaire +2 more sources

