Results 151 to 160 of about 36,975 (185)
Some of the next articles are maybe not open access.
Analysis of Post-Quantum Cryptography in User Equipment in 5G and Beyond
IEEE Conference on Local Computer NetworksThe advent of quantum computing threatens the security of classical public-key cryptographic systems, prompting the transition to post-quantum cryptography (PQC).
Sanzida Hoque +3 more
semanticscholar +1 more source
A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries
International Conference on Quantum Computing and EngineeringThe rapid advancement of quantum computing poses a significant threat to modern cryptographic systems, necessitating the transition to Post-Quantum Cryptography (PQC).
Nadeem Ahmed, Lei Zhang, A. Gangopadhyay
semanticscholar +1 more source
Post-Quantum Cryptography (PQC) for IoT-Consumer Electronics Devices Integrated With Deep Learning
IEEE transactions on consumer electronicsThe emergence of quantum computing seriously threatens the security of legacy cryptographic protocols in consumer electronics devices based on the Internet of Things (IoT).
Ankita Sharma, S. Rani
semanticscholar +1 more source
Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era
arXiv.orgThe advent of quantum computing poses a profound threat to traditional cryptographic systems, exposing vulnerabilities that compromise the security of digital communication channels reliant on RSA, ECC, and similar classical encryption methods.
Dr. G S Mamatha, Namya Dimri, R. Sinha
semanticscholar +1 more source
arXiv.org
Quantum computing threatens the security foundations of consumer electronics (CE). Preparing the diverse CE ecosystem, particularly resource-constrained devices, for the post-quantum era requires quantitative understanding of quantum-resistant ...
Daniel Commey +4 more
semanticscholar +1 more source
Quantum computing threatens the security foundations of consumer electronics (CE). Preparing the diverse CE ecosystem, particularly resource-constrained devices, for the post-quantum era requires quantitative understanding of quantum-resistant ...
Daniel Commey +4 more
semanticscholar +1 more source
Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective
IEEE Internet of Things JournalThe machinery of industrial environments was connected to the Internet years ago with the scope of increasing their performance. However, this change made such environments vulnerable against cyber-attacks that can compromise their correct functioning ...
Javier Oliva del Moral +4 more
semanticscholar +1 more source
High-Speed Design of Post Quantum Cryptography With Optimized Hashing and Multiplication
IEEE Transactions on Circuits and Systems - II - Express BriefsIn this brief, we realize different architectural techniques for improving the performance of post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators on an application-specific integrated circuit (ASIC) platform. Having SABER
Malik Imran +3 more
semanticscholar +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly
Meta-optics empowered vector visual cryptography for high security and rapid decryption
Nature Communications, 2023Mingbo Pu, Xiangang Luo
exaly

