Results 141 to 150 of about 36,975 (185)
Some of the next articles are maybe not open access.

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

Cryptogr.
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi   +4 more
semanticscholar   +1 more source

Performance Analysis and Industry Deployment of Post-Quantum Cryptography Algorithms

arXiv.org
As quantum computing advances, modern cryptographic standards face an existential threat, necessitating a transition to post-quantum cryptography (PQC).
Elif Demir, Buse Bilgin, M. Onbaşlı
semanticscholar   +1 more source

A Survey of Post-Quantum Cryptography Migration in Vehicles

IEEE Access
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography ...
Nils Lohmiller   +3 more
semanticscholar   +1 more source

PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer

IEEE Symposium on Security and Privacy
As post-quantum cryptography (PQC) nears standardization and eventual deployment, it is increasingly important to understand the security of the implementations of selected schemes.
Samy Amer   +7 more
semanticscholar   +1 more source

A Review on the Advances, Applications, and Future Prospects of Post-Quantum Cryptography in Blockchain and IoT

IEEE Access
With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO.
Yong Wang, Eddie Shahril Ismail
semanticscholar   +1 more source

Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

International Conference on Information Networking, 2023
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms.
Ritik Bavdekar   +4 more
semanticscholar   +1 more source

Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization

arXiv.org
Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Tao Liu, G. Ramachandran, Raja Jurdak
semanticscholar   +1 more source

Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography

International Conference on Network of the Future
The imminent emergence of quantum computers poses unprecedented challenges to the current cryptographic standards that secure vital digital communications and data worldwide.
Abdullah Aydeger   +4 more
semanticscholar   +1 more source

5G-AKA-HPQC: Hybrid Post-Quantum Cryptography Protocol for Quantum-Resilient 5G Primary Authentication with Forward Secrecy

arXiv.org
5G enables digital innovation by integrating diverse services, making security especially primary authentication crucial. Two standardized protocols, 5G AKA and EAP AKA', handle authentication for 3GPP and non 3GPP devices.
Yongho Ko, I. W. A. J. Pawana, Ilsun You
semanticscholar   +1 more source

Enhanced Network Security Protocols for the Quantum Era: Combining Classical and Post-Quantum Cryptography, and Quantum Key Distribution

IEEE Journal on Selected Areas in Communications
The emergence of quantum computing poses a threat to classical cryptography algorithms, necessitating a shift to quantum secure cryptography. Hybrid protocols combining at least one classical and one quantum-resistant cryptographic algorithm are becoming
Carlos Rubio García   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy