Results 141 to 150 of about 36,975 (185)
Some of the next articles are maybe not open access.
Cryptogr.
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi +4 more
semanticscholar +1 more source
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi +4 more
semanticscholar +1 more source
Performance Analysis and Industry Deployment of Post-Quantum Cryptography Algorithms
arXiv.orgAs quantum computing advances, modern cryptographic standards face an existential threat, necessitating a transition to post-quantum cryptography (PQC).
Elif Demir, Buse Bilgin, M. Onbaşlı
semanticscholar +1 more source
A Survey of Post-Quantum Cryptography Migration in Vehicles
IEEE AccessThe advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography ...
Nils Lohmiller +3 more
semanticscholar +1 more source
PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer
IEEE Symposium on Security and PrivacyAs post-quantum cryptography (PQC) nears standardization and eventual deployment, it is increasingly important to understand the security of the implementations of selected schemes.
Samy Amer +7 more
semanticscholar +1 more source
IEEE Access
With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO.
Yong Wang, Eddie Shahril Ismail
semanticscholar +1 more source
With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO.
Yong Wang, Eddie Shahril Ismail
semanticscholar +1 more source
Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations
International Conference on Information Networking, 2023The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms.
Ritik Bavdekar +4 more
semanticscholar +1 more source
Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization
arXiv.orgDue to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Tao Liu, G. Ramachandran, Raja Jurdak
semanticscholar +1 more source
Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography
International Conference on Network of the FutureThe imminent emergence of quantum computers poses unprecedented challenges to the current cryptographic standards that secure vital digital communications and data worldwide.
Abdullah Aydeger +4 more
semanticscholar +1 more source
arXiv.org
5G enables digital innovation by integrating diverse services, making security especially primary authentication crucial. Two standardized protocols, 5G AKA and EAP AKA', handle authentication for 3GPP and non 3GPP devices.
Yongho Ko, I. W. A. J. Pawana, Ilsun You
semanticscholar +1 more source
5G enables digital innovation by integrating diverse services, making security especially primary authentication crucial. Two standardized protocols, 5G AKA and EAP AKA', handle authentication for 3GPP and non 3GPP devices.
Yongho Ko, I. W. A. J. Pawana, Ilsun You
semanticscholar +1 more source
IEEE Journal on Selected Areas in Communications
The emergence of quantum computing poses a threat to classical cryptography algorithms, necessitating a shift to quantum secure cryptography. Hybrid protocols combining at least one classical and one quantum-resistant cryptographic algorithm are becoming
Carlos Rubio García +5 more
semanticscholar +1 more source
The emergence of quantum computing poses a threat to classical cryptography algorithms, necessitating a shift to quantum secure cryptography. Hybrid protocols combining at least one classical and one quantum-resistant cryptographic algorithm are becoming
Carlos Rubio García +5 more
semanticscholar +1 more source

